List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.

What will be an ideal response?


Possible answers include inability to perform necessary business functions (because of software modification), public embarrassment (e.g., if websiteis defaced), loss of employees’ time (to find and correct modifications), possible loss of life or serious harm (if safety-­?critical software is modified).

Computer Science & Information Technology

You might also like to view...

A company is hiring several remote employees who will be working primarily from their homes but will need to come into the office once a month. The company is providing the workers with laptop computers and wants a way for them to access their email account whether they are at home, on the road, or in the office.   Which of the following will be the best solution?

A. Internal shared resource B. Virtual desktop infrastructure C. Private cloud model D. Off-site email application

Computer Science & Information Technology

Asymmetric encryption systems use a single key to both encrypt and decrypt a message.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____________________ network is a sub-network in which a dedicated circuit is established between sender and receiver, and all data passes over this circuit.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____ is an excellent multiple queue application.

A. Categorizing data B. Expression parsing C. Parentheses matching D. Reversing of characters in a string

Computer Science & Information Technology