1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
2 years ago
6

Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo

ke them when they want to use mainframe facilities. A risk of this practice is that
(A) Backup procedures for data files would not be as effective.
(B) Users with inadequate training would make more mistakes.
(C) Anyone with access to the personal computers could log on to the mainframe.
(D) Personal computers become much more likely to be physically stolen.
Computers and Technology
1 answer:
diamong [38]2 years ago
7 0

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

You might be interested in
3. SmartArt can be used to create that highlight relationships between two items.
KengaRu [80]
<span>SmartArt can be used to create graphic organizers (Solution:B) that highlight relationships between two items. With SmartArt you can make visual representation of your ideas and information. The tool SmartArt is available </span>in Excel, PowerPoint, Word, but also you create SmartArt object in Outlook.
There are different layouts available for this type of representation.
8 0
3 years ago
(iii) If 1 GB = 2x<br>then what is the<br>value of x?​
frez [133]
Since a Gigabyte is made of Megabytes, 500 Megabytes times 2, 2(500MB), is equal to one Gigabyte. (1000MB)
UNLESS, it wants the Windows way of storage, because one Gigabyte in Windows terms is actually 1024 megabytes... then it’d be 2(512MB) because 512MB and 512MB equals one windows storage gigabyte.
4 0
2 years ago
What is it when called when businesses produce goods and services that consumers do not want​
victus00 [196]
Unsought goods.

Nobody seeks them out, because no one wants them.
7 0
2 years ago
Why dose enginuty suck like really
masya89 [10]

Answer:

if you don't like it why u doin it?

Explanation:

3 0
2 years ago
True or False. A list can have only the same data type values.
shepuryov [24]

the answer its false.

hope this helps

6 0
2 years ago
Other questions:
  • Which activity constitutes legal computer activity?
    12·1 answer
  • Suppose you want to delete an existing file from within Word. What would you do? A. Click on the File button, choose Recent, ope
    9·1 answer
  • 10.
    13·1 answer
  • A flat-panel detector is exposed with nothing between the x-ray tube and detector. 5 images were acquired on 5 different days us
    6·1 answer
  • Choose the HTML5 element below that is used to configure an area on a web page that can stand on its own and could potentially b
    5·1 answer
  • Consider Statement 1: All prime numbers greater than 3 are equal to a multiple of six, plus 1 or minus 1. Let P(x) be the statem
    7·1 answer
  • Will mark brainliest! What does this code do? What kind of code is this called?
    15·1 answer
  • Explain the functions of a VDU?
    6·1 answer
  • How would you define the term technology
    8·1 answer
  • Choose all stages of the information processing cycle.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!