Answer:
The system that will be more prone to attack or vulnerability is the bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.
Explanation:
Solution
If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable to unauthorized persons or individuals.
The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.
With this example, the chances of vulnerability or attacks increases from the following :
- Accounts payable could be disturbed by changing cash in payment false.
- Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
- Transaction fraud like hacking, masquerading are very common in a networked system.
Answer:nice
Explanation:u tryna play doe?
Answer:
The functions of operating system are:
Explanation:
It protects the user to create,copy,delete,move& rename files & folders.
It protects the stored information from unauthorized users & denies them access to data.
It manages the storage and retrieval of data from disks.
It manages the input to and output form of computer system.
Answer: Utility programs, commonly referred to as just "utilities," are software programs that add functionality to your computer or help your computer perform better. These include antivirus, backup, disk repair, file management, security, and networking programs.
Explanation:
Answer:
Transactional File System
Explanation:
To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.