Which group represents the most likely source of an asset being lost through inappropriate computer use?

A. Hackers
B. Employees
C. Crackers
D. Flood


Answer: B. Employees

Computer Science & Information Technology

You might also like to view...

The ________ command reverses the most recent action

Fill in the blank(s) with correct word

Computer Science & Information Technology

Boeing MSL LAN and Honeywell SCOMP systems have which of the following security ratings?

a. B1 b. B3 c. A1 d. A2

Computer Science & Information Technology

____________________ systems are software programs that can make decisions and draw conclusions, similar to a human expert.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. More detail is achievable through using a process called "exploding the diagrams." 2. Data flow diagrams must be drawn working from left to right on the page. 3. Data stores must always have data flow into them in a proper diagram. 4. Linear data flow from process to process is normal in higher level data flow diagrams.

Computer Science & Information Technology