1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stich3 [128]
3 years ago
13

Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu

ter where its data are stored. Another bank has ten branches spread throughout California , with the data being stored on a mainframe in San Francisco . Which system do you think is more vulnerable to unauthorized access
Computers and Technology
1 answer:
GuDViN [60]3 years ago
3 0

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
You might be interested in
Branching is so called because <br>​
ollegr [7]

Anhskmsknsk

Explanation:

jhjdmsmyessi

6 0
3 years ago
Read 2 more answers
All organizations with a router at the boundary between the organization’s internal networks and the external service provider w
Anika [276]

Answer:

False

Explanation:

Access Control Lists (ACLs) are network filters used by routers and some switches to permit and restrict data flows in and out of network devices. When an ACL is implemented in a device or interface, the network device analyses data passing through it, compares it to the specification described in the ACL, and allows it the data to flow or prohibits it. One of the main reasons ACLs arre used is to provide a basic level of security for networks. If anything, the use of ACLs and their complexities bring about a delay in transmission through networks.

3 0
2 years ago
What is the name of the FOLDER in which the file named "script" is contained?
yulyashka [42]

Answer:

The default location for local logon scripts is

  • the Systemroot\System32\Repl\Imports\Scripts folder

5 0
2 years ago
How is abstraction used in a GPS system
ipn [44]
The designs on the map of the GPS system Im would think but can you be more specific?
8 0
3 years ago
Read 2 more answers
Please help me with these two questions! 60 points!
RUDIKE [14]

Answer:

Networks prevent unauthorized access to data and protect equipment. Networked computers are less likely than single computers to suffer equipment failure. Networks allow computers to connect quickly and to share data or equipment.

Explanation:

3 0
2 years ago
Other questions:
  • Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
    14·1 answer
  • You disassemble and reassemble a desktop computer. when you first turn it on, you see no lights and hear no sounds. nothing appe
    11·2 answers
  • The picture that graphically since the items you use in windows is called
    7·1 answer
  • Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio
    5·1 answer
  • A folder has been shared with other users and set to read-only. What does this mean for users?
    12·2 answers
  • Que se puede observar en el escritorio de windows
    8·1 answer
  • Hey guys, I don’t have a problem for you but If anyone knows do you still pass your grade level if you failed 1 class in the las
    11·2 answers
  • Please help it’s timed
    5·1 answer
  • Can somebody tell me the Minecraft command to clear an entire world and destroy every block if u Dunno please don’t answer &gt;-
    13·1 answer
  • How to beat level 50 in give up robot 2
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!