1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
4 years ago
6

________________ occur when a system produces incorrect, inconsistent, or duplicate data.

Computers and Technology
2 answers:
Blababa [14]4 years ago
5 0

Answer:

Data integrity issues

Explanation:

Data integrity refers to the validity or accuracy of data over its lifecycle.

while data integrity issues occurs when a system accidentally or mistakenly produce an incorrect, inconsistent, or duplicate data and this may be due to human error, bugs, viruses, malware, failure in storage, retrieval or processing operations, compromised hardware or disk drive etc.

qaws [65]4 years ago
3 0

Answer:

(d) Data integrity issues

Explanation:

Data integrity is one of the CIA (Confidentiality, Integrity, Availability) triads and a basic concept of information security. It ensures that data is correct, valid, consistent, complete and unaltered throughout its use. When this is not the case, then data integrity issues arise.

The following are some of the concerns or issues associated with data integrity;

i. human carelessness.

ii. system failure.

iii. unauthorized access by hackers and other cyber criminals.

iv. malicious programs such as viruses, worms e.t.c

You might be interested in
Assume we have two lists, list A and list B. List A contains the numbers [20,10,20], while list B contains the numbers [40,10,30
Tcecarenko [31]

Answer:

5/ 18

Explanation:

Given :

List A: [20,10,20]

List B: [40,10,30,20,40,30]

Chance that number drawn from list A is larger than or equal to that drawn dlfrom list B.

If:

A = 20

B ≤ 20 : [10,20] = 2

A = 10

B ≤ 10 : [10] = 1

A = 20

B ≤ 20 : [10,20] = 2

Probability = Required outcome / Total possible outcomes

Hence,

required outcome = (2 + 2 +1) = 5

Total possible outcomes = 3C1 * 6C1 = (3 * 6) = 18

Hence,

chance that the number we drew from list A is larger than or equal to the number we drew from list B

= 5 / 18

8 0
3 years ago
Reference variables allow arguments to be passed by ____________.
son4ous [18]

Answer:

Reference

Explanation:

The Reference type variable is such type of variable in C# that holds the reference of memory address instead of value. Examples for reference type are classes, interfaces, delegates and arrays.

We can pass parameters to the method by reference using <em>ref </em>keyword

It’s mandatory to initialize the variable value before we pass it as an argument to the method in c#

For example,

int x = 10;  // Variable need to be initialized

Add(ref x); // method call

If you pass parameters by reference in method definition, any changes made to it affect the other variable in method call.

Here's a sample program:

using System;

namespace ConsoleApplication

{

   public class Test

   {

       public static void Main()

       {

           int i = 10;

           Console.WriteLine("i=" + i);

           Add(ref i);

           Console.WriteLine("i=" + i);

           Console.ReadLine();

       }

       public static void Add( ref int j)

       {

           j = j + 10;

           Console.WriteLine("j="+j);

       }

   }

}

Output:

i=10

j=20

i=20

7 0
3 years ago
Which of the following creates a photograph? Silver Shutters Light Mirrors
Keith_Richards [23]

Explanation:

the reaction between silver and light creates a photograph

8 0
3 years ago
Read 2 more answers
You have recently been hired as the new network administrator for a startup company. The company's network was implemented prior
AleksAgata [21]

Answer: • Physically secure high-value systems

• Identify and document each user on the network

Explanation:

To develop a manageable network plan, the milestones include:

• prepare to document

• mapping network,

• protect your network

• network accessibility

• user access etc...

When identifying ways to protect the network, the tasks that should be completed are:

•®Physically secure high-value systems

• Identify and document each user on the network

4 0
3 years ago
Describe the key differences between raster-based and vector-based graphics.
Kazeer [188]

Answer:

asd

Explanation:

8 0
3 years ago
Other questions:
  • Write a multithreaded program that generates the Fibonacci series using Pthreads thread library. This program should work as fol
    10·1 answer
  • To what extent do you think st. cyprian was effective in his efforts to bring inherited christian teachings to bear on the unpre
    10·1 answer
  • Key Categories: more libraries and thousands of functions
    7·1 answer
  • Word Online works exact same as the downloaded Office 2016 version.<br>True<br>False​
    7·1 answer
  • Asking yourself questions can help you think of what to _____, in order to get answers.
    8·1 answer
  • While there are a lot of programming languages out there, one of the most widely used when it comes to web applications and web
    10·1 answer
  • When creating a documentary, what is not an appropriate source for footage?
    11·1 answer
  • What allows a programmer to write code quickly and efficiently for an action that must be repeated?
    14·1 answer
  • Explain how to create a constant variable. Give an example of creating a speed constant that does not include a decimal.
    8·2 answers
  • Which html tag designates links to other web pages?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!