ICT topic 5 security policies
- Created by: hannah5176
- Created on: 16-05-16 14:32
Other questions in this quiz
2. Software that can help with a security strategy for example ...
- Save in hidden area
- Code it all
- Encryption
- Padlock
3. Peer To Peer
- A small network where each computer has the same status, processing is local on a single PC, resources are shared.
- Preferred choice for large networks. All computers are not the same status. Usually a more powerful computer is used as the central computer.
4. Definition of User Accounts
- Does not allows the manager of the system to manage user accounts by ISSUEof access levels to users
- Allows the manager of the system to manage user accounts by ALLOCATING of access levels to users
- Allows the manager of the system to manage user accounts by ISSUE ofaccess levels to users
- Does not allows the manager of the system to manage user accounts by ALLOCATING of access levels to users
5. There are 6 factors which influence the choice of a network, which one is included ?
- Size of Database
- Size of Storage
- Size of Organisation
- Size of Network
- SIze of Company
Similar ICT resources:
Teacher recommended
Comments
No comments have yet been made