Which of the following is considered an unintentional threat to the integrity of the operating system?
a. a hacker gaining access to the system because of a security flaw
b. a hardware flaw that causes the system to crash
c. a virus that formats the hard drive
d. the systems programmer accessing individual user files
B
You might also like to view...
Describe a leaderless group discussion.
What will be an ideal response?
Filter questions enable the researcher to filter out respondents who are not adequately informed
Indicate whether the statement is true or false
Groot Promotional Services uses a job order system for costing and billing promotional services for dance and ballet performances. Groot has four public relations specialists plus an office staff. At the beginning of the year, Groot estimated the total cost of salaries and benefits for the public relations specialists at $675,000 and a total of 7500 billable hours for the year. All remaining office and administrative costs were estimated at $405,000. The allocation base for office and administrative costs is billable hours. In June, Groot signed a contract for a Russian ballet performance. It estimated the new contract would require 34 hours of specialist time. What is the total cost estimate for this contract?
A) $1836 B) $4896 C) $3060 D) $1224
When faced with the dilemma of decision-making for “gray area” problems, which format uses the technique of asking yourself five specific questions like “What are the consequences?” or “What can I live with?”
A. the Lonergan/Baird Method B. the Moral Compass C. the Foursquare Protocol D. the Five Timeless Questions