1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
6

Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo

ke them when they want to use mainframe facilities. A risk of this practice is that
(A) Backup procedures for data files would not be as effective.
(B) Users with inadequate training would make more mistakes.
(C) Anyone with access to the personal computers could log on to the mainframe.
(D) Personal computers become much more likely to be physically stolen.
Computers and Technology
1 answer:
diamong [38]3 years ago
7 0

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

You might be interested in
What are some types of vehicle technology advancements?
julia-pushkina [17]

Answer:

D is the suitable answer.

Explanation:

All of the above

5 0
4 years ago
Consider the following method intended to modify the parameter names by removing all instances of the String n.
Anastasy [175]

Answer:

int i = 0; i < names.size(); i++

Explanation:

The ArrayList must be read in the forward direction, and it is going to start from 0 certainly. Also, the iteration is going to end when i is exactly one less than the size of the ArrayList. And this is possible only if we choose the option mentioned in the Answer section. In this, i starts from 0 and iterates till i is one less than name.size() which is the size of the ArrayList.

7 0
3 years ago
Both IT and organizational strategies are static and can be harmed when people resist change because IS success depends on the s
anzhelika [568]
Think it’s true idk
8 0
3 years ago
HELP
Aleks [24]

Answer:

If a good friend comes to me for advice in pursuing a music career. With my knowledge of digital technology and the performing

arts, my advice to use digital technology to help build her career by <u>Delivering service to clients .</u>

Explanation:

<u>There were several reasons for this: </u>

• Being able to access work platforms and resources removed the need to travel back

to office bases because remote access allowed the completion of administrative

tasks where the practitioner was working.

• Working with clients in rural and isolated areas can prove difficult in terms of meeting

clients face to face and digital solutions helped to resolve this. This is because more

clients can be seen remotely than when practitioners must travel to see them.  

8 0
3 years ago
A vast global network that is made up of many smaller interconnected networks is known as:
Galina-37 [17]

The answer is The Internet.   It is a vast global network that is made up of many smaller interconnected networks. It connects to millions of computer units world wide, in which any computer can communicate with any other computer as long as they are both connected to the Internet. It also made access to information and communication easier.

6 0
4 years ago
Read 2 more answers
Other questions:
  • How is an interpreter different from a compiler?
    6·2 answers
  • You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
    12·1 answer
  • Though it is seen as a last resort bankruptcy allows a consumer to
    6·1 answer
  • How long is the latency time of a typical hard-disk drive spinning at 360 revolutions per second?
    6·1 answer
  • What term is used to describe an individual's money and personal property? budget income assets finances
    12·2 answers
  • Please label the parts its urgent Best answer receives a brainliest and 20 points please i need it :) :) ​
    5·2 answers
  • Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following
    11·2 answers
  • TIME REMAINING
    9·1 answer
  • List how much hard disk capacity you recommend, and write a sentence explaining why.
    8·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!