Answer:
B. installApplication(‘A’, 1);
Explanation:
Given
The above code segment
Required
The correct call to installApplication
The function installApplication is declared as void, meaning that it is not expected to return anything.
Also, it receives a character and an integer argument.
So, the call to this function must include a character and an integer argument, in that order.
Option D is incorrect because both arguments are integer
Option C is incorrect because it passes no argument to the function.
Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).
Option B is correct
Gray London is a retired race car driver who helped Dale Earnhardt, Jr. get his start. He is writing a book and making a video about the early days or Dale Earnhardt. He is trying to decide whether to market these items directly over the Internet or to use intermediaries. To make this decision, he needs to know the pros and cons of each route. Provide that information and make a recommendation to him.
Answer:
Explanation:
Marketing your product directly over the internet can lead to much greater profits and there are many options that you can choose from in order to target the correct audience. Unfortunately, doing so does require marketing knowledge and is basically like growing a business. If you were to use intermediaries they already have the knowledge necessary to market your product but will take a percentage of the profits, which will ultimately limit your gains. Since Gray London is a race car driver, I am assumming that he does not have any prior technological expertise or marketing expertise, therefore I would recommend using intermediaries.
A ----------------has the least flexibility and is best suited for mass production. It has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.
Answer:
Job order production
Explanation:
A job order production has the least flexibility and is best suited for mass production.
It also has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.
brainleist please..
Answer -------> Transfer line <---------
please click on the picture look at the PICTURE for the correct answer.
Dynamic addressing: __________.
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks
Explanation:
jwjajahabauiqjqjwjajjwwjnwaj
Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate type (such as including a .0 at the end of a double or quotes around a String).
4 + 1 + 9 + "." + (-3 + 10) + 11 / 3
8 + 6 * -2 + 4 + "0" + (2 + 5)
1 + 1 + "8 - 2" + (8 - 2) + 1 + 1
5 + 2 + "(1 + 1)" + 4 + 2 * 3
"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)
Answer:
[tex](a)\ 14"."43[/tex]
[tex](b)\ 0"0"7[/tex]
[tex](c)\ 2"8 - 2"611[/tex]
[tex](d)\ 7"(1 + 1)"46[/tex]
[tex](e)\ "1"23"4"30"7"17[/tex]
Explanation:
Required
Evaluate each expression
The simple rules to follow are:
(1) All expressions in bracket will be evaluated based on its data type
(2) Divisions will return only integer values
(3) Integers immediately after string values will be concatenated (not added)
So, the results are as follows:
[tex](a)\ 4 + 1 + 9 + "." + (-3 + 10) + 11 / 3[/tex]
Evaluate till a string is encountered
[tex]4 + 1 + 9 = 14[/tex]
Followed by "."
Then:
[tex](-3 + 10) = 7[/tex]
[tex]11/ 3 = 3[/tex]
[tex]"." + (-3 + 10) + 11/3 = "."73[/tex] -- because expressions after string operations are concatenated.
So, we have:
[tex]4 + 1 + 9 + "." + (-3 + 10) + 11 / 3 = 14"."43[/tex]
[tex](b)\ 8 + 6 * -2 + 4 + "0" + (2 + 5)[/tex]
Evaluate till a string is encountered
[tex]8 + 6 * -2 + 4 =0[/tex]
[tex]"0" + (2 + 5) ="0"7[/tex]
So, we have:
[tex]8 + 6 * -2 + 4 + "0" + (2 + 5) = 0"0"7[/tex]
[tex](c)\ 1 + 1 + "8 - 2" + (8 - 2) + 1 + 1[/tex]
Evaluate till a string is encountered
[tex]1 + 1 = 2[/tex]
[tex]"8 - 2" + (8 - 2) + 1 + 1 = "8 - 2"611[/tex]
So, we have:
[tex]1 + 1 + "8 - 2" + (8 - 2) + 1 + 1 = 2"8 - 2"611[/tex]
[tex](d)\ 5 + 2 + "(1 + 1)" + 4 + 2 * 3[/tex]
Evaluate till a string is encountered
[tex]5 + 2 =7[/tex]
[tex]"(1 + 1)" + 4 + 2 * 3 = "(1 + 1)"46[/tex] --- multiply 2 and 3, then concatenate
So, we have:
[tex]5 + 2 + "(1 + 1)" + 4 + 2 * 3= 7"(1 + 1)"46[/tex]
[tex](e)\ "1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)[/tex]
Since a string starts the expression, the whole expression will be concatenated except the multiplication and the expressions in bracket.
So, we have:
[tex]"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9) = "1"23"4"30"7"17[/tex]
What is the future of marketing automation?
Answer:
give me number I will explain fast I am free now reply bro I am waiting
Answer:
To put it into simple words: the future of marketing automation is customers centric.
From data collection to lead generation, marketing automation will stay B2B marketers’ favorite in the future. Based on the current analytics, let’s have a look at how automation is driving lead generation today as well as what’s to come.
It’s going to be all about customersPersonalization will become even more importantMore Jobs and Activities Will Require Marketing AutomationGeneric Content Will Become Almost Non-ExistentMarketers Should Stay Current With Marketing Automation for Maximum ROIMarketing automation is a dynamic field and it will continue to evolve and transform processes in the future. If you in the marketing frontier, and looking to transform your lead generation processes, don’t be afraid to give marketing automation a shot.
2. Which tab is used to edit objects on the Slide Master and layouts?
A. View
B. Insert
C. Shape format
D. Design
Answer is not A. View
It’s B. Insert
Answer:
it is....insert tab..B
Explanation:
insert tab includes editing options
The DevOps team is requesting read/write access to a storage bucket in the public cloud that is located in a backup region. What kind of services are they requesting
Answer:
Authorization
Explanation:
The kind of service that they are requesting is known as Authorization. This is basically when a user, such as the DevOps team in this scenario, is requesting permission to access a certain service or function that is locked. In this scenario, the services being requested are the read/write access which would allow the DevOps team to manipulate the data in the storage bucket. This is usually locked because the data is sensitive and innapropriate changes can cause many errors in the system. Therefore, authorization is needed to make sure that only specific users have access.
3. Most widely used structure for recording database modifications is called
A. Scheduling
B. Buffering
C. Log
D. Blocking
Answer:
C. log
Explanation:
The log is a sequence of log records, recording all the update activities in the database
hope this helps
Answer:
C. Log is the
answer
Explanation:
a sequence of log records recording all update activity in database
Which of the following is a benefit of a digital network?
Security is enhanced.
Multiple devices can be connected.
Users are familiar with the software.
It makes using the internet easier.
Answer:
Multiple devices can be connected
The social network created through digital technology is referred to as a "digital network." It provides phone, video, data, and other network services for digital switching and transmission.
What is Digital network?In order to align the network with business demands, it has markets, data networks, and communications networks.
Digital networks' core are networking components like switches, routers, and access points. These tools are used to link networks to other networks, secure equipment like computers and servers connected to organizational networks, and analyze data being sent across networks.
Through cloud-enabled central administration, digital networks provide end-to-end network services for on-premises and cloud space. All network components are monitored, analyzed, and managed by a central server.
Therefore, The social network created through digital technology is referred to as a "digital network." It provides phone, video, data, and other network services for digital switching and transmission.
To learn more about Technology, refer to the link:
https://brainly.com/question/9171028
#SPJ2
the id selector uses the id attribute of an html element to select a specific element give Example ?
Answer:
The id selector selects a particular html element
Explanation:
The id selector is uses the id attribute to select a specific html element. For example, if we have a particular header which is an html element and we want to give it a particular background color, we use the id selector and give it an id attribute in the CSS file. An example of an html header with id = 'blue' is shown below. The style sheet is an internal style sheet.
!doctype html
<html>
<head>
<title>Test</title>
<style>
#blue { background-color: blue;
}
</style>
</head>
<body>
<h1 id = 'blue'>Our holiday</h1>
<p>This is the weekend</p>
</body>
</html>
D State Six Impact of ICT the society
Answer:
home officebankhospital hotelExplanation:
ICT is a device that display and command information outside.
In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.
Answer:
"if" is the right response.
Explanation:
Forward chaining is being utilized just to split the logical sequential order down as well as operate throughout every component once the preceding one is accomplished, from start to finish.Its whole algorithm begins with proven information that activates all the rules, which are fulfilled as well as makes established realities even more complete.That's the code that's was already provided with the assignment
// Program takes a hot dog order
// And determines price
using System;
using static System.Console;
class DebugFour1
{
static void Main()
{
const double BASIC_DOG_PRICE = 2.00;
const double CHILI_PRICE = 0.69;
const double CHEESE_PRICE = 0.49;
String wantChili, wantCheese;
double price;
Write("Do you want chili on your dog? ");
wantChilli = ReadLine();
Write("Do you want cheese on your dog? ");
wantCheese = ReadLine();
if(wantChili = "Y")
if(wantCheese = "Y")
price == BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;
else
price == BASIC_DOG_PRICE + CHILI_PRICE;
else
if(wantCheese = "Y")
price = BASIC_DOG_PRICE;
else
price == BASIC_DOG_PRICE;
WriteLine("Your total is {0}", price.ToString("C"));
}
}
Answer:
Code:-
// Program takes a hot dog order
// And determines price
using System;
using static System.Console;
class DebugFour1
{
static void Main()
{
const double BASIC_DOG_PRICE = 2.00;
const double CHILI_PRICE = 0.69;
const double CHEESE_PRICE = 0.49;
String wantChili, wantCheese;
double price;
Write("Do you want chili on your dog? ");
wantChili = ReadLine();
Write("Do you want cheese on your dog? ");
wantCheese = ReadLine();
if (wantChili == "Y")
{
if (wantCheese == "Y")
price = BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;
else
price = BASIC_DOG_PRICE + CHILI_PRICE;
}
else
{
if (wantCheese == "Y")
price = BASIC_DOG_PRICE + CHEESE_PRICE;
else
price = BASIC_DOG_PRICE;
}
WriteLine("Your total is {0}", price.ToString("C"));
}
}
Base conversion. Perform the following conversion (you must have to show the steps to get any credit.
3DF16 = ?
Base to be converted to was not included but we would assume conversion to base 10(decimal)
Answer and Explanation:
The 3DF in base 16 is a hex number so we need to convert to its equivalent binary/base 2 form:
We therefore each digit of given hex number 3DF in base 16 to equivalent binary, 4 digits each.
3 = 0011
D = 1101
F = 1111
We then arrange the binary numbers in order
3DF base 16 = 1111011111 in base 2
We then convert to base 10 =
= 1x2^9+1x2^8+1x2^7+1x2^6+0x2^5+1x2^4+1x2^3+1x2^2+1×2^1+1×2^0
= 991 in base 10
Why input screens are better data entry than entreing data dirrctly to a table
Answer:
are better data entry designs than entering data directly to a table. ... hence a user can design input fields linked to several tables/queries.
Explanation:
Input screens are better data entry designs than entering data directly to a table because a user can design input fields linked to several tables/queries.
What is digital information?Digital information generally consists of data that is created or prepared for electronic systems and devices such as computers, screens, calculators, communication devices. These information are stored by cloud.
They are converted from digital to analog and vice versa with the help of a device.
Data entered in the table directly is easier than data entry method.
Thus, input screens are better data entry than entering data directly to a table.
Learn more about digital information.
https://brainly.com/question/4507942
#SPJ2
Answer to this problem
Answer:
hi..,.................................................
The computer that is used in scientific research is ........
Answer:
supercomputers are the computer that is used in scientific research.
Answer:
super computer is the right answer
Write a removeDuplicates() method for the LinkedList class we saw in lecture. The method will remove all duplicate elements from the LinkedList by removing the second and subsequent elements. If there is only one copy of an element, it is not removed. The list size should shrink accordingly based on the number of duplicates removed.
Answer:
removeDuplicates() function:-
//removeDuplicates() function removes duplicate elements form linked list.
void removeDuplicates() {
//declare 3 ListNode pointers ptr1,ptr2 and duplicate.
//initially, all points to null.
ListNode ptr1 = null, ptr2 = null, duplicate = null;
//make ptr1 equals to head.
ptr1 = head;
//run while loop till ptr1 points to second last node.
//pick elements one by one..
while (ptr1 != null && ptr1.next != null)
{
// make ptr2 equals to ptr1.
//or make ptr2 points to same node as ptr1.
ptr2 = ptr1;
//run second while loop to compare all elements with above selected element(ptr1->val).
while (ptr2.next != null)
{
//if element pointed by ptr1 is same as element pointed by ptr2.next.
//Then, we have found duplicate element.
//Now , we have to remove this duplicate element.
if (ptr1.val == ptr2.next.val)
{
//make duplicate pointer points to node where ptr2.next points(duplicate node).
duplicate = ptr2.next;
//change links to remove duplicate node from linked list.
//make ptr2.next points to duplicate.next.
ptr2.next = duplicate.next;
}
//if element pointed by ptr1 is different from element pointed by ptr2.next.
//then it is not duplicate element.
//So, move ptr2 = ptr2.next.
else
{
ptr2 = ptr2.next;
}
}
//move ptr1 = ptr1.next, after check duplicate elements for first node.
//Now, we check duplicacy for second node and so on.
//so, move ptr1 by one node.
ptr1 = ptr1.next;
}
}
Explanation:
Complete Code:-
//Create Linked List Class.
class LinkedList {
//Create head pointer.
static ListNode head;
//define structure of ListNode.
//it has int val(data) and pointer to ListNode i.e, next.
static class ListNode {
int val;
ListNode next;
//constructor to create and initialize a node.
ListNode(int d) {
val = d;
next = null;
}
}
//removeDuplicates() function removes duplicate elements form linked list.
void removeDuplicates() {
//declare 3 ListNode pointers ptr1,ptr2 and duplicate.
//initially, all points to null.
ListNode ptr1 = null, ptr2 = null, duplicate = null;
//make ptr1 equals to head.
ptr1 = head;
//run while loop till ptr1 points to second last node.
//pick elements one by one..
while (ptr1 != null && ptr1.next != null)
{
// make ptr2 equals to ptr1.
//or make ptr2 points to same node as ptr1.
ptr2 = ptr1;
//run second while loop to compare all elements with above selected element(ptr1->val).
while (ptr2.next != null)
{
//if element pointed by ptr1 is same as element pointed by ptr2.next.
//Then, we have found duplicate element.
//Now , we have to remove this duplicate element.
if (ptr1.val == ptr2.next.val)
{
//make duplicate pointer points to node where ptr2.next points(duplicate node).
duplicate = ptr2.next;
//change links to remove duplicate node from linked list.
//make ptr2.next points to duplicate.next.
ptr2.next = duplicate.next;
}
//if element pointed by ptr1 is different from element pointed by ptr2.next.
//then it is not duplicate element.
//So, move ptr2 = ptr2.next.
else
{
ptr2 = ptr2.next;
}
}
//move ptr1 = ptr1.next, after check duplicate elements for first node.
//Now, we check duplicacy for second node and so on.
//so, move ptr1 by one node.
ptr1 = ptr1.next;
}
}
//display() function prints linked list.
void display(ListNode node)
{
//run while loop till last node.
while (node != null)
{
//print node value of current node.
System.out.print(node.val + " ");
//move node pointer by one node.
node = node.next;
}
}
public static void main(String[] args) {
//Create object of Linked List class.
LinkedList list = new LinkedList();
//first we create nodes and connect them to form a linked list.
//Create Linked List 1-> 2-> 3-> 2-> 4-> 2-> 5-> 2.
//Create a Node having node data = 1 and assign head pointer to it.
//As head is listNode of static type. so, we call head pointer using class Name instead of object name.
LinkedList.head = new ListNode(1);
//Create a Node having node data = 2 and assign head.next to it.
LinkedList.head.next = new ListNode(2);
LinkedList.head.next.next = new ListNode(3);
LinkedList.head.next.next.next = new ListNode(2);
LinkedList.head.next.next.next.next = new ListNode(4);
LinkedList.head.next.next.next.next.next = new ListNode(2);
LinkedList.head.next.next.next.next.next.next = new ListNode(5);
LinkedList.head.next.next.next.next.next.next.next = new ListNode(2);
//display linked list before Removing duplicates.
System.out.println("Linked List before removing duplicates : ");
list.display(head);
//call removeDuplicates() function to remove duplicates from linked list.
list.removeDuplicates();
System.out.println("")
//display linked list after Removing duplicates.
System.out.println("Linked List after removing duplicates : ");
list.display(head);
}
}
Output:-
Major findings of evolution of computers
Answer:
twitt
Explanation:
Illustrate why Sally's slide meets or does not meet professional expectations?
Describe all the things Sally can improve on one of her slides?
Suggest some ways Sally can learn more PowerPoint skills.
The correct answer to this open question is the following.
Unfortunately, you did not provide any context or background about the situation of Sally and the problem with her slides. We do not know it, just you.
However, trying to be of help, we can comment on the following general terms.
When someone does not meet professional expectations, this means that this individual did not prepare her presentation, lacked technical skills, did not included proper sources, or missed the proper visual aids to make the presentation more attractive and dynamic.
What Sally can improve about her slides is the following.
She can design a better structure for the presentation to have more congruence.
Sally has to clearly establish the goal or goals for her presentation.
She has to add many visuals instead of plain text. This way she can better capture the interest of her audience.
If she can use more vivid colors instead of pale or dark ones, that would be best.
No paragraphs unless necessary. She better uses bullet points.
Take care of the tone of her voice. During her practice, she can record her vice to check how it sounds.
Which devices are managed through device management?
Device management is the process of managing
________devices.
Answer:
organization
Explanation:
The answer is organization I am thinking.
List and explain the type of networking
Answer:
Used for everything from accessing the internet or printing a document to downloading an attachment from an email, networks are the backbone of business today. They can refer to a small handful of devices within a single room to millions of devices spread across the entire globe, and can be defined based on purpose and/or size.
We put together this handy reference guide to explain the types of networks in use today, and what they’re used for.
11 Types of Networks in Use Today
1. Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.
2. Local Area Network (LAN)
We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs.
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.
3. Wireless Local Area Network (WLAN)
Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.
4. Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.
5. Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).
6. Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart.
The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public.
7. Storage-Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.
8. System-Area Network (also known as SAN)
This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds.
9. Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals to serve users and devices.
10. Enterprise Private Network (EPN)
These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.
11. Virtual Private Network (VPN)
By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely.
12. How many different documents can
you have open at one time?
Answer:
10 documents ^_^
Explanation:
I can open it at the same time on my laptop ●~●
The next few questions will be based on interpretations of a topographic map from East Brownsville, TX. To answer these questions you will have to access the topographic map of East Brownsville attached below:
What stage of fluvial landscape development is shown across the region displayed here?
a. Youthful
b. Mature
c. Old age
Answer:
a. Youthful
Explanation:
The river gets its water from youth stage fluvial water. The river meanders from side to side. East Brownsville will be less stable in international boundary in terms of physical position on the landscape because its base level drops.
write a program that assigns values to
three variables, assigns the sum (adds
the three values to a variable called
total and prints total.
Explanation:
10:A program that assigns the sum 20,30,40
20: input 20,30,40
30:sum input
40: print total
End
The purpose of the five-entity minimum, six-entity maximum is to establish a relatively small baseline for you to keep the scope of your database project constrained.
a. True
b. False
write a script to check command arguments. Display the argument one by one (use a for loop). If there is no argument provided, remind users about the mistake.
Answer and Explanation:
Using Javascript programming language, to write this script we define a function that checks for empty variables with if...else statements and then uses a for loop to loop through all arguments passed to the function's parameters and print them out to the console.
function Check_Arguments(a,b,c){
var ourArguments= [];
if(a){
ourArguments.push(a);}
else( console.log("no argument for a"); )
if(b){
ourArguments.push(b);}
else( console.log("no argument for b"); )
if(c){
ourArguments.push(c);}
else( console.log("no argument for c"); )
for(var i=0; i<ourArguments.length; i++){
Console.log(ourArguments[i]);
}
}
Write a method printShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline and decare/use loop variable. Example output for numCycles = 2:
1: Lather and rinse.
2: Lather and rinse.
Done.
import java.util.Scanner; 3 public class ShampooBottle 4 5 Your solution goes here / 7 public static void main (String [] args) ShampooBottle trialSize - new ShampooBottle); trialsize.printShampooInstructions (2) 10 Run View your last submission Your solution goes here / public void printShampooInstructions (int numCycles) f if (numCycles 1) System.out.printin("Too few.") else if (numCycles4) System.out.printin("Too many.") else System.out.println("Done."); for (int i = 1; i (z numCycles ; ++i){ System.out . printin (? + ": Lather and rinse.");
Answer:
if (numCycles < 1){
System.out.println("Too few.");
}
else if (numCycles > 4){
System.out.println("Too many.");
}
else{
for(int i = 1; i <= numCycles; i++)
{
System.out.println(i + ": Lather and rinse.");
}
System.out.println("Done.");
}
Explanation:
Many companies possess valuable information they want to guard closely (ex. new chip design, competition plans, legal documents). Personal computer hard disks these days are full of important photos, videos, and movies. As more and more information is stored in computer systems, the need to protect it is becoming increasingly important. Which of the following statements is incorrect with respect to Security?
a. security has many facets; three of the more important ones are: the nature of the threats, the nature of intruders, and cryptography
b. data integrity means that unauthorized users should not be able to modify any data without the owner's permission
c. a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for
d. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes
Answer: D. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes
Explanation:
Data security is essential to protecting unwanted people from having access to ones data, malicious attack should also be prevented and unusual behavior should be monitored.
Data security has many facets such as threat nature, the nature of intruders, and cryptography. Furthermore, data integrity means that unauthorized users should not be able to modify any data without the owner's permission. Also, the statement that a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for is correct.
It should be no noted that rats gnawing backup tapes cannot prevent data loss. Therefore, the correct option is D
Ranges of up addresses that anyone can use for their internal networks are known as