1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
3 years ago
8

Identify the six components of an information system. Which are most directly affected by the study of computer security? Which

are most commonly associated with its study?
Computers and Technology
1 answer:
zhannawk [14.2K]3 years ago
8 0

Answer:

data

hardware

software

network

people

resources

Explanation:

The security can effect directly these components:

Data because we can store our information with some security protocol, and we can encrypt it.

Software because we can use some tools like firewalls or antivirus.

Network with this component we can prevent a lot of attacks, there is a lot of information about security network even certificates.

People we could lose data and important information if someone steals your password.

The software is most associated with my study because I like the backend and frontend in web development.

You might be interested in
Intranets: a. are based on mainframe technology. b. provide the platform on which a firm builds its information systems. c. are
antoniya [11.8K]

Answer: Option (e) is correct

Explanation:

Intranet is the private network that is created for sharing information and data ,handle computing facilities, sharing files etc through internet service within a organization. Members of the company can access this technology for performing activities on the network.

  • Other options are incorrect because numerous networks are not linked ,does not share information outside organization, does not act as information system's base and neither is linked with mainframe technology.
  • Thus,the correct option is option(e).
5 0
3 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Who needs to be involved when assembling business solutions that include hardware and software?
sveta [45]
Software engineer i would say
5 0
3 years ago
Read 2 more answers
Which type of profile allows a user within a corporation to use the same user profie regardless of the computer that user is usi
zzz [600]

Answer: c)Roaming user profiles

Explanation:Roaming user profiles are those profiles that creates the copy from the local profile and get stored in the network server. Roaming user profiles haves the function of getting logged in any computer system that the user is processing by getting downloaded.

It has the advantage of not creating profiles on every computer system that user wants to login .Thus, the correct answer is option(c) because other profiles mentioned in the option cannot copy the profile in the server and so do not have capability to be accessed in other computer system.

8 0
4 years ago
What happens if you create multiple accounts just to get points faster?
balandron [24]
I don’t think it will work sadly. You can probably accumulate points though on your pre existing account. Hope that helps!
8 0
3 years ago
Other questions:
  • You use a(n) ____ variation when a use case is less specific than others, and you want to be able to substitute the more specifi
    8·1 answer
  • Pascal's Triangle is a triangular array in which every number represents the
    15·1 answer
  • Write a program that tells what coins to give out for any amount of change from 1
    6·1 answer
  • In terms of data storage and sharing, in what way, if any, do dropbox services differ from archiving services?
    8·1 answer
  • The spreadsheet ends after you reach column Z and row 99. True or false
    12·1 answer
  • This assignment requires you to write a program to analyze a web page HTML file. Your program will read one character at a time
    13·1 answer
  • Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St
    5·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • How do i delete cookies on a chromebook?
    8·1 answer
  • What are the basic data types supported in C programing language?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!