Sending potentially sensitive information by email
Potentially sensitive information can be sent via Email only if the Email is encrypted
Explanation:
No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.
Agreed to all the terms mentioned in the contract
Answer:
False
Explanation:
The private member of a class is not accessible by using the Dot notation ,however the private member are those which are not accessible inside the class they are accessible outside the class .The public member are accessible inside the class so they are accessible by using the dot operator .
<u>Following are the example is given below in C++ Language </u>
#include<iostream> // header file
using namespace std;
class Rectangle
{
private:
double r; // private member
public:
double area()
{ return 3.14*r*r;
}
};
int main()
{
Rectangle r1;// creating the object
r1.r = 3.5;
double t= r1.area(); // calling
cout<<" Area is:"<<t;
return 0;
}
Output:
compile time error is generated
<u>The correct program to access the private member of class is given below </u>
#include<iostream> // header file
using namespace std;
class Rectangle
{
private:
double r; // private member
public:
double area()
{
r1=r;
double t2=3.14*r2*r2;
return(t2); // return the value
}
};
int main()
{
Rectangle r1;// creating the object
r1.r = 1.5;
double t= r1.area(); // calling
cout<<" Area is:"<<t;
return 0;
}
Therefore the given statement is False
Answer
Directory Services
<u></u>
<u>Definition</u>
It is a type of software that is used to unify and customize the resources available at the network.
<u>Explanation</u>
This software is used to gather the information and addresses of all computers connected on the network.
It is a type of information store, where all the information related to resources (computer) and services of network has been stored. It also gives administrator rights to the single point to manage whole network resources.
This is the reason, Option "D" is the best choice for me as sole IT employ in a company. I will prefer directory services software to gather the information of all computers of organization and manage users in company.
Answer:
Stack
Explanation:
Stack is a linear data structure that follows a particular order in the way an operation is done or sequence a job is completed.
It uses either LIFO ( Last In, First Out) which is also known as first come first served sequence or FILO (First In, Last Out) sequence.
There are several real life examples of which we can use the example of replacing the snack items Sarah brought for the customer.
If Sarah used the LIFO method, it means she replaced the snack items first ontop of the already existing snack items that's why there is a mismatch.