Explanation:
Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as ethical .
There are certain reasons where one's email,voice mails and computer files can be monitored are as following:
- Protect the security information and security.
- Investigation of complaints of harassment.
- Preventing personal use of employer's facilities.
The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
<h3>What is a system hack?</h3>
System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.
Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
Learn more about system hack from
brainly.com/question/13068599
#SPJ1
Answer:
A SEPARATE FACILITY WITH COMPUTER EQUIPMENT THAT REQUIRES INSTALLATION AND CONFIGURATION.
Explanation:
A backup site or work area recovery site is a location where an organization can relocate following a disaster, such as fire, flood, terrorist threat or other disruptive event. There are three types: hot site, cold site and warm site.
A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.
Warm sites might have backups on hand, but they may not be complete this means that a warm site is configured with power, phone, network etc. may have servers and other resources. But a warm site is not ready for immediate switch over because it still needs to be installed and configured.
Therefore, a warm site is A SEPARATE FACILITY WITH COMPUTER EQUIPMENT THAT REQUIRES INSTALLATION AND CONFIGURATION.