What are certain things you can do to protect your personal data when using a public workstation? please check all that apply. sign out of account completely
clear cache
clear history
clear cookies
run a virus protection program before using the computer

Answers

Answer 1
Answer:

Answer:

To protect your personal data when using a public workstation, you should do the following:

- Sign out of your account completely

- Clear cache

- Clear history

- Clear cookies

Running a virus protection program before using the computer is also a good practice, but it may not always be feasible or possible to do so on a public workstation.


Related Questions

The auto fill feature of excel only allows the user to fill cells with a series using the existing formatting options of the cell. True or False?
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You have just created a directory named Sales on a file server. David, a Sales Manager, has to use this directory to keep sales reports. David reports that he is unable to save his reports in the directory. When you list the directory using the LS command, you get the following result: drwxr-xr-x 2 root root 2048 Jan 2 2006 Sales What is the most likely cause?A) The sales directory is not properly mounted.B) David is working on his local computers login. C) The sales directory has been deleted by accident.E) David does not have the write permission on the directory.
Given the declarations struct BrandInfo { string company; string model; }; struct DiskType { BrandInfo brand; float capacity; }; DiskType myDisk; what is the type of myDisk.brand?
What is the purpose of requirements gathering and analysis?
The set of instructions that allows a particular program to complete a task.

when a cloud customer uploads personally identifiable information (pii) to a cloud provider, who is ultimately responsible for the security of that pii?

Answers

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11

A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

Answers

Answer:

Protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can easily communicate with people all over the world, and thus play a critical role in modern digital communications.

Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer for a linked list. // Postcondition: The function f has done some computation with // the linked list, but the list itself is unchanged. What is the best data type for head_ptr in this function?

Answers

Answer:

node*

Explanation:

The argument 'head_ptr' is the head-pointer for the following linked list so the data type of the following argument 'head_ptr' is 'node*' in the method 'f()' because the following method 'f()' computed the linked list, but perhaps the list itself remains unaffected.

A linked list is the DS type in which that component would be a different entity. Such component of the following list is called as a node that consists of two elements

Search engines enable you to

Answers

Search engines are programs that enable a user to search and find content under the category that a user is searching for and related results. A search engine receives a users input that is typed from a keyboard and then analyses the words typed in and searches through the database through related context/results. If the words typed in is recognizable, it will bring up Websites/URLS of sites that are related to the content.

A search engine is not to be confused with a browser. While a search engine finds websites/content, a browser is a application or program that is the interface used to host search engines using HTML. Although to some degree, they overlap, they do not always.

For example: Google and Yahoo are search engines that looks up input received by a user while examples of a browser will be Opera, Internet Explorer, and Firefox (Mozilla Firefox)
Its like Bing, Google and Yahoo.
Locate web pages related to a specific subject.
Hope this helps you 

Assume the int variable value has been initialized to a positive integer. Write a while loop that prints all of the positive divisors of value. For example,if values is 28, it prints divisors of28: 1 2 4 7 14 28

Answers

Answer:

The program to this question can be given as:

Program:

#include <iostream>//header file.

using namespace std; //using namespace

int main() //main function.

{

int value=28, x=1; //define variable.

cout<<"divisors of "<< value <<":"; //print value.

while (x <= value) //loop

{

if ((value % x) ==0) //if block

cout<<" "<<x; //print value

x++; //increment value.

}

return 0;

}

Output:

divisors of 28: 1 2 4 7 14 28

Explanation:

The description of the above c++ program can be given as:

  • In this program firstly we include a header file. Then we define a main method. In this method we define a variables that is "value and x" and assign a value that is "28 and 1".
  • The variable "x" is used to calculate the value of divisors and print its values and then we print the value variable value.
  • Then we define a while loop. It is an entry control loop in this loop, we check the condition that the variable x is less than equal to value. In this loop, we use a conditional statement.
  • In the if block we define condition that is variable value modular variable x is equal to 0. if this condition is true it will print the value and increment value of variable x. When variable x is greater than and equal to value variable it will terminate the loop and print the value.

So, the output of this program is "1 2 4 7 14 28".

The best grounding method when arc welding is to connect the welding machine grounding cable to

Answers

the material you are welding other wise an arc will not be created 

Answer:

What it is you are welding

Explanation:

If vertical welding, place above weld as a general rule.

Clean the metal you place the clamp on.

When connecting clamp, most machines work better when the cable is facing up unless stated otherwise.

Never ground on a stool in which you intend to sit.

Ground as close to the weld as possible.

Never put stinger on the ground clamp.