Computers and Technology

Which of the following scenarios describes an IT professional using good methods to protect
passwords and system access of users? Check all
of the boxes that apply.
When setting up the e-mail program for each
employee's computer, the IT professional has
the employee enter his or her e-mail
password to protect privacy.
The IT professional posts a list of employee
usernames and passwords on the wall.
The IT professional views an employee's
browsing history while the employee is on a
fifteen-minute break.

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 15:30, ninja12302
Some of the items below indicate the steps required to move a slide to a different location in a presentation. select those steps and indicate the order in which they should be performed to move the slide. (for example, if an item describes what you do first, select 1.) included in the list are items that are not part of the process. for these items, select n/a, an abbreviation for not applicable. 1 β€” first 2 β€” second 3 β€” third 4 β€” fourth 5 β€” fifth 6 β€” sixth n/a β€” not applicable drag the slide to the desired place. enter the slide position desired. hold the mouse button down. select move from the tools menu. select the slide. switch to the notes view.
Answers: 3
image
Computers and Technology, 22.06.2019 10:30, robert7248
You have a large, late-model pick-up truck with a rear seat. the pick-up truck weighs 6,500 pounds. the florida seat belt law
Answers: 1
image
Computers and Technology, 22.06.2019 23:30, keviongardner
The next button in the review section shows the next available comment. next slide with no comment. previous comment. edited comment.
Answers: 1
image
Computers and Technology, 24.06.2019 02:00, akatherine1738
What is a loop? a. a collection of function definitions at the top of a program b. a line of code that defines a variable and assigns it a value c. a program that opens the turtle graphics window d. a block of code that repeats a specific number of times
Answers: 1
Do you know the correct answer?
Which of the following scenarios describes an IT professional using good methods to protect
p...

Questions in other subjects: