List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.
What will be an ideal response?
Possible answers include inability to perform necessary business functions (because of software modification), public embarrassment (e.g., if website is defaced), loss of employees’ time (to find and correct modifications), possible loss of life or serious harm (if safety-critical software is modified).
You might also like to view...
Which of the following is not one of the NIST’s five basic goals for data security?
a. sealed messages b. secret messages c. sequenced messages d. silent messages
Consider the two tables T1 and T2 shown in Figure 6.15. Show the results of the following operations:
What will be an ideal response?
Identify the letter of the choice that best matches the phrase or definition.
A. The practice of sharing or pooling computing resources, such as servers B. Typically has one program running at a time, though others may be running in the background C. A proprietary mobile operating system D. Saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state E. Saves any open documents and programs to an internal hard drive before removing power from the computer or device F. Enables user to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer, mobile device, or network G. A unique combination of characters that identifies a specific user H. A private combination of characters associated with the user name that allows access to certain computer resources I. Android app store that provides access to apps, songs, books, and movies J. Define who can access certain resources and when they can access those resources K. If application software has stopped responding and the hard disk's LED blinks repeatedly, the operating system probably is doing this L. Technology that allows two devices to share information by touching M. An iOS app that provides a centralized location for coupons N. When working with a command-line interface, the set of commands entered into the computer is called this O. A Windows Phone app that provides a centralized location for coupons P. Microsoft's cloud server Q. A popular, multitasking UNIX-based operating system R. You should run exactly one of this kind of application on your computer S. Enables you to sync mail, calendars, contacts, and other items on iOS T. For each user, a network administrator establishes this, which enables the user to access, or sign in to, a computer or to a network
1000BaseLX has a maximum length of __________________.
Fill in the blank(s) with the appropriate word(s).