1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
4 years ago
8

Identify the six components of an information system. Which are most directly affected by the study of computer security? Which

are most commonly associated with its study?
Computers and Technology
1 answer:
zhannawk [14.2K]4 years ago
8 0

Answer:

data

hardware

software

network

people

resources

Explanation:

The security can effect directly these components:

Data because we can store our information with some security protocol, and we can encrypt it.

Software because we can use some tools like firewalls or antivirus.

Network with this component we can prevent a lot of attacks, there is a lot of information about security network even certificates.

People we could lose data and important information if someone steals your password.

The software is most associated with my study because I like the backend and frontend in web development.

You might be interested in
âin order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely
faltersainse [42]
(keystroke) logger. I'm hoping this is what you wanted.
5 0
4 years ago
Complete the code.
Dmitrij [34]

<u>Answer</u> : Float

<u>Explanation</u> :

Complete the code.

import csv

inFile = open ("one.txt","r")

outFile = open("another.txt", "w")

myReader = csv.reader(inFile)

for item in myReader:

aWord = item[0]

aNumber = float(item[1]) + 0.4

line = aWord + "," + str(aNumber) + 'Float'

outFile.write(line)

3 0
3 years ago
You are considering creating a new operating system to compete with the current operating systems on the market. You must decide
Misha Larkins [42]

Answer:

well for one you need to find the correct platform by comparing them and deciding which ones are the best and start eliminating each one until you have the one you want , then if you are competing make sure you have high quality ratings, graphics make sure there are no bugs or ways to hack it but also make sure that it stays within your budget, and i would target the most active social media group: teens, they spend a lot of time on social media and games so i would target them because they could be persuaded quite easily. and i would make sure the performance is great, the preference would be something that would appeal to the teens, and the price would be something that they could afford but somewhat on the pricey side so that i have enough money to keep the program running.

Explanation:

5 0
3 years ago
Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IP
chubhunter [2.5K]

Answer:

The five eras are general- purpose mainframe and minicomputer computing, personal computers, client/server networks, ...

7 0
3 years ago
The world wide web was originally conceived of as a(n) _____.
Setler [38]
Hello <span>Lcedillo7073 </span>


Answer: The world wide web was originally conceived of as a(n) Internal document management system


Hope this helps
-Chris
7 0
3 years ago
Other questions:
  • Before you begin entering data in a worksheet, you should create a _____ for the worksheet.
    12·2 answers
  • The system should enable the staff of each academic department to examine the courses offered by their department, add and remov
    14·1 answer
  • Windows on the desktop are just one of many objects used in a graphical user interface (GUI)-- buttons, drop-down list boxes, po
    7·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?
    7·1 answer
  • Mention<br>any<br>5<br>indicators of<br>happiness​
    11·2 answers
  • What is the definition of podcast
    10·1 answer
  • Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l
    14·1 answer
  • What is computer science ​
    5·1 answer
  • is there a way to send files from my PC to my iPhone? My PC’s wifi receptors are broken so it cannot connect to wifi. Is there a
    6·1 answer
  • STOP DELETING MY ANSWERS AND QUESTIONS!!!!!!!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!