Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invoke them when they want to use mainframe facilities. A risk of this practice is that
A. Personal computers become much more likely to be physically stolen.
B. Users with inadequate training would make more mistakes.
C. Anyone with access to the personal computers could log on to the mainframe.
D. Backup procedures for data files would not be as effective.
Answer: C
You might also like to view...
________________ advertising tends to be banned in most countries.
Fill in the blank(s) with the appropriate word(s).
Donna is well-respected for her decision-making skills, always supporting her proposals with detailed pro and con insights she gathers from sources with a balance of perspectives. Donna's strategy to ________ facilitates acceptance of her decisions by top management.
A. generate resources B. rely on objective information C. focus on win-win solutions D. control the agenda E. make herself irreplaceable
The time it takes a technician to fix a computer problem is exponentially distributed with a mean of 15 minutes. What is the variance of the time it takes a technician to fix a computer problem? ____________________ minutes
Fill in the blank(s) with correct word
Hesson Properties, Inc.The following transactions occurred during June: June 1Purchased two new maintenance carts on account at $750 each. Payment is due in 30 days June 8Accepted $500 of advance payments from customers for services to be provided next month June 15Received the utility bill for $300. Payment is due in 30 days June 20Billed customers $1,500 services provided. Payment is due in 30 days. June 30Received $500 from customers who were billed earlierRefer to Hesson Properties. What journal entry is required to record the utility bill?
A. Utilities Expense 300 Cash 300 B. Accounts Receivable 300 Utilities Expense 300 C. Utilities Expense 300 Accounts Payable 300 D. Cash 300 Utilities Expense 300