This topic contains a solution. Click here to go to the answer

Author Question: When a file is saved, a file extension: a. is added to the end of the file name to identify the ... (Read 207 times)

bucstennis@aim.com

  • Hero Member
  • *****
  • Posts: 532
When a file is saved, a file extension:
 
  a. is added to the end of the file name to identify the format in which the file has been saved.
  b. is an instruction to see features and hidden information such as track changes information.
  c. is the way to later find the file on the hard drive.
  d. is created with a preset, predesigned page.

Question 2

Explain the importance of computer security and the steps that a law firm may take to protect the information contained in a computer network.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

jasonq

  • Sr. Member
  • ****
  • Posts: 335
Answer to Question 1

a

Answer to Question 2

With a single computer, the security issues are related to installing corrupted software or accessing something from the Internet that has a virus. By contrast, on a network, every computer work station represents a possible source of security issues and if a single station introduces a virus, the entire network will be impacted. One solution is to limit access, such as the ability to make changes to the operating system, add or delete software, and retrieve files. Network security protocols limit access to the file server and peripherals, such as printers or other work stations. Network rights and privileges determine who on the network may access the information and who has authority to access the server, the data stored on the server, and the flow of information. A network administrator is the person with the highest level of access to, or authority over, the network. Passwords can be used to grant access to files and computers. Firewalls are programs designed to limit access to computer or a computer network but may also prevent working at an off-site location. Antivirus Software scans the computer to identify the presence of viruses, and in some better programs, eliminates the virus. Despite the existence of antivirus software, viruses do get through, and there are certain precautions that should be followed: (1) do not open files or attachments from unknown email senders; (2) scan every disk with antivirus software before using it; (3) downloaded files should be scanned, and; (4) be sure antivirus software is continually updated. Finally, data should be backed up by creating a copy of data as a precaution against the loss or damage of the original data. It is a good policy to back up on a daily basis and store the backup media off-site.




bucstennis@aim.com

  • Member
  • Posts: 532
Reply 2 on: Aug 3, 2018
Great answer, keep it coming :)


TheDev123

  • Member
  • Posts: 332
Reply 3 on: Yesterday
YES! Correct, THANKS for helping me on my review

 

Did you know?

All adverse reactions are commonly charted in red ink in the patient's record and usually are noted on the front of the chart. Failure to follow correct documentation procedures may result in malpractice lawsuits.

Did you know?

Pubic lice (crabs) are usually spread through sexual contact. You cannot catch them by using a public toilet.

Did you know?

When taking monoamine oxidase inhibitors, people should avoid a variety of foods, which include alcoholic beverages, bean curd, broad (fava) bean pods, cheese, fish, ginseng, protein extracts, meat, sauerkraut, shrimp paste, soups, and yeast.

Did you know?

The National Institutes of Health have supported research into acupuncture. This has shown that acupuncture significantly reduced pain associated with osteoarthritis of the knee, when used as a complement to conventional therapies.

Did you know?

Acetaminophen (Tylenol) in overdose can seriously damage the liver. It should never be taken by people who use alcohol heavily; it can result in severe liver damage and even a condition requiring a liver transplant.

For a complete list of videos, visit our video library