List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.

What will be an ideal response?


Possible answers include inability to perform necessary business functions (because of software modification), public embarrassment (e.g., if website is defaced), loss of employees’ time (to find and correct modifications), possible loss of life or serious harm (if safety-critical software is modified).

Computer Science & Information Technology

You might also like to view...

Which of the following is not one of the NIST’s five basic goals for data security?

a. sealed messages b. secret messages c. sequenced messages d. silent messages

Computer Science & Information Technology

Consider the two tables T1 and T2 shown in Figure 6.15. Show the results of the following operations:

What will be an ideal response?

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. The practice of sharing or pooling computing resources, such as servers B. Typically has one program running at a time, though others may be running in the background C. A proprietary mobile operating system D. Saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state E. Saves any open documents and programs to an internal hard drive before removing power from the computer or device F. Enables user to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer, mobile device, or network G. A unique combination of characters that identifies a specific user H. A private combination of characters associated with the user name that allows access to certain computer resources I. Android app store that provides access to apps, songs, books, and movies J. Define who can access certain resources and when they can access those resources K. If application software has stopped responding and the hard disk's LED blinks repeatedly, the operating system probably is doing this L. Technology that allows two devices to share information by touching M. An iOS app that provides a centralized location for coupons N. When working with a command-line interface, the set of commands entered into the computer is called this O. A Windows Phone app that provides a centralized location for coupons P. Microsoft's cloud server Q. A popular, multitasking UNIX-based operating system R. You should run exactly one of this kind of application on your computer S. Enables you to sync mail, calendars, contacts, and other items on iOS T. For each user, a network administrator establishes this, which enables the user to access, or sign in to, a computer or to a network

Computer Science & Information Technology

1000BaseLX has a maximum length of __________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology