COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Using anti-virus, anti-spyware software and a firewall
|
|
Thinking twice before opening attachments and clicking links even from people and companies I know
|
|
Telling everyone who uses a computer about ways to protect themselves and their computer
|
|
All of these
|
Detailed explanation-1: -There are five data collection approaches in surveillance including passive surveillance, active surveillance, sentinel surveillance, community-based surveillance, and syndromic surveillance.
Detailed explanation-2: -Polio vaccine protects children by preparing their bodies to fight the poliovirus. Almost all children (more than 99 percent) who get all the recommended doses of the inactivated polio vaccine will be protected from polio. It is also very important to practice good hand hygiene and wash hands often with soap and water.
Detailed explanation-3: -Representation, to provide an accurate picture of the temporal trend of the disease; Sensitivity, to allow identification of individual persons with disease to facilitate treatment; quarantine, or other appropriate control measures; and. Specificity, to exclude persons not having disease.
Detailed explanation-4: -Reporting. Someone has to record the data. Data accumulation. Someone has to be responsible for collecting the data from all the reporters and putting it all together. Data analysis. Judgment and action.