1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
6

________________ occur when a system produces incorrect, inconsistent, or duplicate data.

Computers and Technology
2 answers:
Blababa [14]3 years ago
5 0

Answer:

Data integrity issues

Explanation:

Data integrity refers to the validity or accuracy of data over its lifecycle.

while data integrity issues occurs when a system accidentally or mistakenly produce an incorrect, inconsistent, or duplicate data and this may be due to human error, bugs, viruses, malware, failure in storage, retrieval or processing operations, compromised hardware or disk drive etc.

qaws [65]3 years ago
3 0

Answer:

(d) Data integrity issues

Explanation:

Data integrity is one of the CIA (Confidentiality, Integrity, Availability) triads and a basic concept of information security. It ensures that data is correct, valid, consistent, complete and unaltered throughout its use. When this is not the case, then data integrity issues arise.

The following are some of the concerns or issues associated with data integrity;

i. human carelessness.

ii. system failure.

iii. unauthorized access by hackers and other cyber criminals.

iv. malicious programs such as viruses, worms e.t.c

You might be interested in
Elizabeth types in the following search terms: "Adoption AND cats AND NOT Persians." what results will her search provide?
bazaltina [42]

Answer

pages that reference adoption and cats but not Persians

Explanation

Search terms are the words or phrases that a user enters into a search engine. Also known as the search query. They are also referred to as keywords or  words, terms, and phrases that visitors use to find your site or when one wants to search something on the search engines. You just need to type into search box order to pull up list of results. there are different types of search like search queries where a user enters into a web search engine to satisfy his or her information needs, they are often plain text or hypertext with optional search directives. and the Navigational search queries  is a search query entered with the intent of finding a particular website, web-page or a certain phrase.

3 0
2 years ago
Read 2 more answers
Which nmap switch is used to detect target OS and services?<br> a -S<br> b -p<br> c -F<br> d -A
antiseptic1488 [7]

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

3 0
3 years ago
Software applications called _____ provide the means to record information that passes through a computer or router that is hand
Bezzdna [24]

Answer:

sniffer programs

Explanation:

Software applications called <u>sniffer programs</u>  provide the means to record information that passes through a computer or router that is handling Internet traffic.

3 0
3 years ago
Write a paragraph about ICT in personal life?
melisa1 [442]

Answer:

Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications[1] and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage and audiovisual systems, that enable users to access, store, transmit, and manipulate information.

6 0
2 years ago
You are called to assist in troubleshooting a network problem that has occurred soon after a significant IPv6 implementation. So
HACTEHA [7]

Answer:i dont kowe

Explanation:

5 0
2 years ago
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • What is the answer and why?
    12·1 answer
  • Discuss advantages and disadvantages of Twisted Pair?
    6·1 answer
  • Which one is not the future of wireless technology?
    8·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • Refer to the following code segment. You may assume that array arr1 contains elements arr1[0],arr[1],...,arr[N-1], where N = arr
    8·1 answer
  • How to get off of supervised user
    7·1 answer
  • How do you create multiple columns in Word?
    12·1 answer
  • Convert the given for loop to while loop and find the output of the program assuming the
    14·1 answer
  • What kind of AR target category makes sense for a playing card with a picture on it?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!