Name at least two threats to information technology
What will be an ideal response?
Threats to information technology include hazards to hardware, software, networks, and data, including information stored in electronic databases. Data accuracy and security are most relevant to the use of computerized medical records. However, computer hardware, software, and data can be damaged by anything from simple carelessness to power surges, crime, and computer viruses. Computer systems, like any other property, also can be hurt or destroyed by disasters, such as floods and fires.
You might also like to view...
Which of the following organs/tissues has/have alpha1-receptors?
a. lung b. liver c. blood vessels d. adrenal medulla
The term geriatric generally refers to a person who is ________ years of age or older.
A. 55 B. 60 C. 65 D. 70
You have been monitoring a new employee during her first month on the job. She appears to have developed as sense of security, a sense of belonging among her peers in the department, and mutual respect with her coworkers. You are a manager who feels that self-actualization according to Maslow's hierarchy of needs is important and recognize that the new employee has achieved the level of meeting
needs at which level?? A) Belonging B) Esteem C)Safety? D) Self-actualization
What is the most important factor to consider when coding?
A. Productivity B. Accuracy C. Timeliness D. All of these