List security measures that should be taken to prevent unauthorized persons from using the computer system.

What will be an ideal response?


Security measures are:

a. The server computer is locked in an area only accessible to authorized personnel.

b. User I Ds and passwords are used to access menus and programs. Coded user I Ds restrict access to update and inquiry functions.

Computer Science & Information Technology

You might also like to view...

Class templates:

a. May include the statement template< typename Type > anywhere. b. Must put template< typename Type > before the class definition. c. Must include template< typename Type > inside the class definition. d. Have the option of including the optional statement template< typename Type >. ANS: b.

Computer Science & Information Technology

The large grey handle in the top-left corner is called the ________

A) resizing handle B) move handle C) delete handle D) sizing handle

Computer Science & Information Technology

The NPER function would be best used to determine the periodic interest rate of an investment

Indicate whether the statement is true or false

Computer Science & Information Technology

P426 is an example of a PID

Indicate whether the statement is true or false

Computer Science & Information Technology