Discuss the problems associated with microcomputer security, and contrast the measures required to provide a secure environment with those of a mainframe computing environment.

What will be an ideal response?


The problems concern data security and physical security. Problems and precautions in dealing
with these are generally as for part two of the previous question. It is important that a contrast is
made with a mainframe environment. For example, in dealing with microcomputers, you are
dealing with individual machines and staff, possibly over a wide location. Much of the
responsibility rests with members of staff, consequently, all staff training is important. In the
mainframe environment it is possible to set up centralized controls (physical and logical).
Consequently, it should be an easier environment to control, with the responsibility residing in the
IT manager.

Computer Science & Information Technology

You might also like to view...

You have a large dataset that will print on several pages. You want to ensure that related records print on the same page with column and row labels visible and that confidential information is not printed. You should apply all of the following page setup options except which one to accomplish this?

What will be an ideal response?

Computer Science & Information Technology

Describe a thread.

What will be an ideal response?

Computer Science & Information Technology

Typecasting anything that's not an object into an object is known as _________.

a) unboxing b) converting c) wrapping d) boxing

Computer Science & Information Technology

A generic method can be overloaded by ________ method.

a) a non-generic method b) generic method c) a and b d) None of the above

Computer Science & Information Technology