SlideShare a Scribd company logo
1 of 3
disscussion reply to the question asked from students minimum
words count 75 each
1: A company should evaluate there flow of information and
departments and based in that decide who should have access to
what information. Not every employee needs the access to
company's important documents. The less people that have
access the better. Also, another way that I have seen to prove
work is when you have more than one persons authorization
needed to access something. When a worked at a company in
order for me to access some stuff I would need my supervisor to
override for me and if he wasn't available the system required
that 2 employees used there logins including mine to be able to
access whatever I needed and they could not leave my sight
until I was done. Ethical Issues that can come in play while
doing school work and installing new system would be to not
plagiarize. You don't want to spend all this money to go to
school and learn nothing by cheating or using a security system
that is easily accessible. If its a system that you can easily get
in, a hacker would have no problem.
2:
Discuss about most relevant and significant tools that can
potentially be used to protect business records of a company?
Documents, laptops, cell phones, and storage devices such as
usb and flash drives should be secured by being locked up in an
office, safe, or cabinet. There should be a limited of employees
with access to the key and information. Paper files with
business or consumer information must be shredded and
discarded. It is better to shred the paperwork in house. A
company I had previously worked for used to hire a company to
shred their paperwork for them. Everyone would pile the
sensitive information into a large locked bin, then the
'shredders' would pick up the bins and dump the paperwork into
their trucks for shredding. On one occasion, the person picking
up the bins accidentally dropped it and the papers spilled out
and blew across the parking lot! Of course, strong passwords
are necessary to secure sensitive data as well as encrypting
information, establishing firewalls, anti virus programs, and
hiring IT personnel.
3: I can say it is very important that all business owners have a
method to protect all their records to keep all their paperwork in
a safe place. Especially nowadays, i cant speak on how
everyone else should run their business, but i can say as far as
me trying to become a business owner i will have separate
copies of everything that goes on in my business and have it
secured in a safe place, or my own personal computer, and etc.
In todays world sometimes you cant even trust your own staff so
when it comes down to certain customers files i will have them
secured so that i am the only one who can view it especially
since i plan on opening up a nursing home for the elderly. Their
information needs to be kept in a safe place so that not everyone
can view their charts.
4:
4:Do you think perceptions of American Muslims and Muslims
in general have changed since 9/11? If so, are these changes
justified? Why? If not, why do you believe they have not
changed?
5:Before World War I and II, anti-Semitism was more prevalent
than it is today. Does anti-Semitism still exist? In what forms?
6: I can agree that some of the generation I'm from and on tend
to forget other people's feelings. I was bullied severely as a
child, for example. However, I've noticed through all that that
the main reason it continued was because the adults took on a "I
didn't see it, it didn't happen." attitude. All they would of had to
do was look at the security cameras, but they failed to even do
that. (We were a super small town, by the way. Technically
classed as a village. -To clarify: this was when I lived in
Randolph, MN.-) It's sad to think that things like bullying and
prejudice is perpetuated by the older generations, but it also
makes some sense. Here's why: Things like The Red Scare. We,
as a country, were so scared that we were going to be attacked
by others in our own country that we turned on our own
neighbors. We had so much fear that even our closest friends
became enemies over night simply because of their possible
views or country of origin. The worst part is: It's happening
again. It's a different group (Muslims instead of Communists),
but it's the same fear.

More Related Content

Similar to disscussion reply to the question asked from students minimum words .docx

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whTanaMaeskm
 
I agree with storing all information such as receipts in a clou.docx
I agree with storing all information such as receipts in a clou.docxI agree with storing all information such as receipts in a clou.docx
I agree with storing all information such as receipts in a clou.docxmarilynnhoare
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxDIPESH30
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxaman341480
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxcelenarouzie
 
Tools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparentTools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparentGraeme Bodys
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Error correction exercise identity theft cae
Error correction exercise identity theft caeError correction exercise identity theft cae
Error correction exercise identity theft caejeanphilippeguy
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital AgeTony Fish
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 

Similar to disscussion reply to the question asked from students minimum words .docx (17)

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
I agree with storing all information such as receipts in a clou.docx
I agree with storing all information such as receipts in a clou.docxI agree with storing all information such as receipts in a clou.docx
I agree with storing all information such as receipts in a clou.docx
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docx
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docx
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docx
 
Tools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparentTools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparent
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Error correction exercise identity theft cae
Error correction exercise identity theft caeError correction exercise identity theft cae
Error correction exercise identity theft cae
 
Freedom of Speech
Freedom of Speech Freedom of Speech
Freedom of Speech
 
Prof transcript
Prof transcriptProf transcript
Prof transcript
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 

More from jameywaughj

DUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docx
DUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docxDUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docx
DUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docxjameywaughj
 
DUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docx
DUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docxDUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docx
DUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docxjameywaughj
 
Due 103120143 paragraph 1 reference  Write a summary of .docx
Due 103120143 paragraph 1 reference  Write a summary of .docxDue 103120143 paragraph 1 reference  Write a summary of .docx
Due 103120143 paragraph 1 reference  Write a summary of .docxjameywaughj
 
DUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docx
DUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docxDUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docx
DUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docxjameywaughj
 
Due 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docx
Due 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docxDue 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docx
Due 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docxjameywaughj
 
DUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docx
DUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docxDUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docx
DUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docxjameywaughj
 
Due 1.14.15400 words 1 referenceHuman resources pr.docx
Due 1.14.15400 words 1 referenceHuman resources pr.docxDue 1.14.15400 words 1 referenceHuman resources pr.docx
Due 1.14.15400 words 1 referenceHuman resources pr.docxjameywaughj
 
DUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docx
DUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docxDUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docx
DUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docxjameywaughj
 
Due 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docx
Due 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docxDue 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docx
Due 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docxjameywaughj
 
DUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docx
DUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docxDUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docx
DUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docxjameywaughj
 
DUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docx
DUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docxDUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docx
DUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docxjameywaughj
 
Draft the next 2- to 3-page section of the paper, due in Week Five.docx
Draft the next 2- to 3-page section of the paper, due in Week Five.docxDraft the next 2- to 3-page section of the paper, due in Week Five.docx
Draft the next 2- to 3-page section of the paper, due in Week Five.docxjameywaughj
 
Drama ConnectionsThe Greeks established many of the bones of sto.docx
Drama ConnectionsThe Greeks established many of the bones of sto.docxDrama ConnectionsThe Greeks established many of the bones of sto.docx
Drama ConnectionsThe Greeks established many of the bones of sto.docxjameywaughj
 
Dr. Wesch describes YouTube as something that gives people new ways .docx
Dr. Wesch describes YouTube as something that gives people new ways .docxDr. Wesch describes YouTube as something that gives people new ways .docx
Dr. Wesch describes YouTube as something that gives people new ways .docxjameywaughj
 
Dr. Carson defines sexual deviations as A) practices and behavio.docx
Dr. Carson defines sexual deviations as A) practices and behavio.docxDr. Carson defines sexual deviations as A) practices and behavio.docx
Dr. Carson defines sexual deviations as A) practices and behavio.docxjameywaughj
 
DQ1 Media technologies have evolved throughout history to include .docx
DQ1 Media technologies have evolved throughout history to include .docxDQ1 Media technologies have evolved throughout history to include .docx
DQ1 Media technologies have evolved throughout history to include .docxjameywaughj
 
Dream TeamSubmit a 1-2 page paper on the following topicImagine.docx
Dream TeamSubmit a 1-2 page paper on the following topicImagine.docxDream TeamSubmit a 1-2 page paper on the following topicImagine.docx
Dream TeamSubmit a 1-2 page paper on the following topicImagine.docxjameywaughj
 
Dq1What do you see as the advantages and disadvantages of using a .docx
Dq1What do you see as the advantages and disadvantages of using a .docxDq1What do you see as the advantages and disadvantages of using a .docx
Dq1What do you see as the advantages and disadvantages of using a .docxjameywaughj
 
DQ1Risk IndentificationState the importance of identifying risks.docx
DQ1Risk IndentificationState the importance of identifying risks.docxDQ1Risk IndentificationState the importance of identifying risks.docx
DQ1Risk IndentificationState the importance of identifying risks.docxjameywaughj
 
Due - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docx
Due - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docxDue - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docx
Due - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docxjameywaughj
 

More from jameywaughj (20)

DUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docx
DUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docxDUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docx
DUE 11.07.14 @1200PMUnderstand PhaseThe Understand phase.docx
 
DUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docx
DUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docxDUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docx
DUE 11.14.14 @1159PMI believe the purpose of the Innovate phas.docx
 
Due 103120143 paragraph 1 reference  Write a summary of .docx
Due 103120143 paragraph 1 reference  Write a summary of .docxDue 103120143 paragraph 1 reference  Write a summary of .docx
Due 103120143 paragraph 1 reference  Write a summary of .docx
 
DUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docx
DUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docxDUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docx
DUE 11.04.14 @1159PMIt is time to launch. The Launch Pad phase.docx
 
Due 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docx
Due 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docxDue 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docx
Due 11 Mar 2015 1000am ESTStatistic in BusinessWrite a 300-wor.docx
 
DUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docx
DUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docxDUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docx
DUE 10.31.14 @ 1200PMsearch for and discuss a news article or .docx
 
Due 1.14.15400 words 1 referenceHuman resources pr.docx
Due 1.14.15400 words 1 referenceHuman resources pr.docxDue 1.14.15400 words 1 referenceHuman resources pr.docx
Due 1.14.15400 words 1 referenceHuman resources pr.docx
 
DUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docx
DUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docxDUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docx
DUE 10.07.14 @ 1159pmTopics covered1. Explain the import.docx
 
Due 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docx
Due 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docxDue 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docx
Due 10 Feb 2015 at 12pm EST Map the Supply Chain PaperSelect.docx
 
DUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docx
DUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docxDUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docx
DUE 09.24.14 @ 1159pmDocument RequirementsMS WordFont size.docx
 
DUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docx
DUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docxDUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docx
DUE 11.21.14 @ 1159PMA Beta factor represents risk in a financ.docx
 
Draft the next 2- to 3-page section of the paper, due in Week Five.docx
Draft the next 2- to 3-page section of the paper, due in Week Five.docxDraft the next 2- to 3-page section of the paper, due in Week Five.docx
Draft the next 2- to 3-page section of the paper, due in Week Five.docx
 
Drama ConnectionsThe Greeks established many of the bones of sto.docx
Drama ConnectionsThe Greeks established many of the bones of sto.docxDrama ConnectionsThe Greeks established many of the bones of sto.docx
Drama ConnectionsThe Greeks established many of the bones of sto.docx
 
Dr. Wesch describes YouTube as something that gives people new ways .docx
Dr. Wesch describes YouTube as something that gives people new ways .docxDr. Wesch describes YouTube as something that gives people new ways .docx
Dr. Wesch describes YouTube as something that gives people new ways .docx
 
Dr. Carson defines sexual deviations as A) practices and behavio.docx
Dr. Carson defines sexual deviations as A) practices and behavio.docxDr. Carson defines sexual deviations as A) practices and behavio.docx
Dr. Carson defines sexual deviations as A) practices and behavio.docx
 
DQ1 Media technologies have evolved throughout history to include .docx
DQ1 Media technologies have evolved throughout history to include .docxDQ1 Media technologies have evolved throughout history to include .docx
DQ1 Media technologies have evolved throughout history to include .docx
 
Dream TeamSubmit a 1-2 page paper on the following topicImagine.docx
Dream TeamSubmit a 1-2 page paper on the following topicImagine.docxDream TeamSubmit a 1-2 page paper on the following topicImagine.docx
Dream TeamSubmit a 1-2 page paper on the following topicImagine.docx
 
Dq1What do you see as the advantages and disadvantages of using a .docx
Dq1What do you see as the advantages and disadvantages of using a .docxDq1What do you see as the advantages and disadvantages of using a .docx
Dq1What do you see as the advantages and disadvantages of using a .docx
 
DQ1Risk IndentificationState the importance of identifying risks.docx
DQ1Risk IndentificationState the importance of identifying risks.docxDQ1Risk IndentificationState the importance of identifying risks.docx
DQ1Risk IndentificationState the importance of identifying risks.docx
 
Due - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docx
Due - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docxDue - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docx
Due - June 16, 2015 by NOONPlease see attachment for Week 3 Assi.docx
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

disscussion reply to the question asked from students minimum words .docx

  • 1. disscussion reply to the question asked from students minimum words count 75 each 1: A company should evaluate there flow of information and departments and based in that decide who should have access to what information. Not every employee needs the access to company's important documents. The less people that have access the better. Also, another way that I have seen to prove work is when you have more than one persons authorization needed to access something. When a worked at a company in order for me to access some stuff I would need my supervisor to override for me and if he wasn't available the system required that 2 employees used there logins including mine to be able to access whatever I needed and they could not leave my sight until I was done. Ethical Issues that can come in play while doing school work and installing new system would be to not plagiarize. You don't want to spend all this money to go to school and learn nothing by cheating or using a security system that is easily accessible. If its a system that you can easily get in, a hacker would have no problem. 2: Discuss about most relevant and significant tools that can potentially be used to protect business records of a company? Documents, laptops, cell phones, and storage devices such as usb and flash drives should be secured by being locked up in an office, safe, or cabinet. There should be a limited of employees with access to the key and information. Paper files with business or consumer information must be shredded and discarded. It is better to shred the paperwork in house. A company I had previously worked for used to hire a company to shred their paperwork for them. Everyone would pile the sensitive information into a large locked bin, then the 'shredders' would pick up the bins and dump the paperwork into
  • 2. their trucks for shredding. On one occasion, the person picking up the bins accidentally dropped it and the papers spilled out and blew across the parking lot! Of course, strong passwords are necessary to secure sensitive data as well as encrypting information, establishing firewalls, anti virus programs, and hiring IT personnel. 3: I can say it is very important that all business owners have a method to protect all their records to keep all their paperwork in a safe place. Especially nowadays, i cant speak on how everyone else should run their business, but i can say as far as me trying to become a business owner i will have separate copies of everything that goes on in my business and have it secured in a safe place, or my own personal computer, and etc. In todays world sometimes you cant even trust your own staff so when it comes down to certain customers files i will have them secured so that i am the only one who can view it especially since i plan on opening up a nursing home for the elderly. Their information needs to be kept in a safe place so that not everyone can view their charts. 4: 4:Do you think perceptions of American Muslims and Muslims in general have changed since 9/11? If so, are these changes justified? Why? If not, why do you believe they have not changed? 5:Before World War I and II, anti-Semitism was more prevalent than it is today. Does anti-Semitism still exist? In what forms? 6: I can agree that some of the generation I'm from and on tend to forget other people's feelings. I was bullied severely as a child, for example. However, I've noticed through all that that the main reason it continued was because the adults took on a "I didn't see it, it didn't happen." attitude. All they would of had to
  • 3. do was look at the security cameras, but they failed to even do that. (We were a super small town, by the way. Technically classed as a village. -To clarify: this was when I lived in Randolph, MN.-) It's sad to think that things like bullying and prejudice is perpetuated by the older generations, but it also makes some sense. Here's why: Things like The Red Scare. We, as a country, were so scared that we were going to be attacked by others in our own country that we turned on our own neighbors. We had so much fear that even our closest friends became enemies over night simply because of their possible views or country of origin. The worst part is: It's happening again. It's a different group (Muslims instead of Communists), but it's the same fear.