1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
6

Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo

ke them when they want to use mainframe facilities. A risk of this practice is that
(A) Backup procedures for data files would not be as effective.
(B) Users with inadequate training would make more mistakes.
(C) Anyone with access to the personal computers could log on to the mainframe.
(D) Personal computers become much more likely to be physically stolen.
Computers and Technology
1 answer:
diamong [38]3 years ago
7 0

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

You might be interested in
. Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
sp2606 [1]

Answer:

a) The composition of the stack is :- 80,50,20,10.

Where 80 is the top and 10 is the last element.

b) The sequence of the popped items 40,30,70,60,90.

Explanation:

Stack is LIFO type data structure means Last in First Out.The element inserted last will be out of the stack first.The removal and addition is only at the one end that is top.

First 10,20,30,40 will be inserted in the stack. 40 is a the top.Now two pop operations occurs. 40 and 30 will be removed from the stack.

Now 50,60,70 will be inserted in the stack then again two pop operations so 70 and 60 will be removed from the stack.

Now the stack contains 50,20,10.Top = 50.

80 and 90 are added to the stack and 1 pop operation that is 90 will be removed.

Stack is 80,50,20,10 . Top = 80.

Sequence of integers popped=40,30,70,60,90.

4 0
3 years ago
If a salesperson were trying to sell this cabin, which word would be best to use to make its size seem most positive?
TiliK225 [7]
cozy because it gives it more of a positive connotation
7 0
2 years ago
Read 2 more answers
3. Create mode was one of the most innovative and influential features of which of the following games?
melamori03 [73]
FarmVille would be the correct answer because it is a game where you build a create your own farm without nobody telling you to this or that
8 0
3 years ago
How many people watch Anime in the world?
iren [92.7K]
3 to 4 billion people.

7 0
3 years ago
Read 2 more answers
A money ____ refers to moving a cash amount from one account to another.
Julli [10]
Money Transfer.
HOPE THIS HELPS!
5 0
3 years ago
Read 2 more answers
Other questions:
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our s
    6·1 answer
  • Help please?
    10·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • A word processing program would probably be used to: 
    8·1 answer
  • Write a function called activity which takes an integer parameter X that does the following:
    6·1 answer
  • Write a C++ program that computes an approximation of pi (the mathematical constant used in many trigonometric and calculus appl
    15·1 answer
  • How can you assess a website for currency?
    14·2 answers
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • If you need assistance or have questions related to your sevis record, i-20, admission, or course registration which phone numbe
    5·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!