1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
4

Consider an automated teller machine (atm) in which users provide a personal identification number (pin) and a card for account

access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.
Computers and Technology
1 answer:
Dima020 [189]3 years ago
4 0

Answer:

Confidentiality of personal PIN, availability of bank services to the user and integrity of the information in the ATM card from the bank server.

Explanation:

Confidentiality is the process of preventing outsiders from seeing the details of the user of an account. The PIN and ATM card is a two factor authentication process to allow only the user of the account to view the bank details.

Availability of the bank information is based on the bank services to provide a constant supply of the information or services requested by the user.

Integrity justifies the originality and quality of the information from bank server to the user in the ATM machine session.

You might be interested in
The calculation of GDP is the sum of: Consumption, Investment, Government Spending, and Net Exports. What is the simple formula
12345 [234]
The correct answer is B
3 0
3 years ago
Companies use virtualization to do all of the following except:
dangina [55]

Answer:

c)

Explanation:

Virtualization refers to running a virtual instance of a computer system apart from the actual software. Companies use this virtualization to do all of the following except Reduce the amount of applications in corporate datacenters. Instead few systems have the applications and those systems are cloned through virtualization.

4 0
3 years ago
1. Conflict resolution is the process of solving disputes and disagreements.
gtnhenbr [62]
1. Conflict resolution is the process of solving disputes and disagreements.

A. True


2. Project managers have the overall responsibility for planning, executing, and completing a project.

A. True


3. Read the following scenario:

A project will require more people than originally estimated.

Identify the possible risks to the project.

B. Money and resources


4 0
3 years ago
Suzy lives alone I. New York where her family lives In Florida
ankoles [38]

Answer:

bro what

Explanation:

3 0
3 years ago
Read 2 more answers
Complex layouts are often created in Java GUIs by using multiple _____ components
mixas84 [53]

Answer: JPanel

Explanation: JPanel is the kind of panel present in the Java that stores the collection of the elements . It has various function being a part of the Java Swing cluster such as the handling of the elements,organizing them ,making layout patterns,etc. As a drawback to these qualities , JPanel displays the property of not having the title bar for the title/heading.

4 0
3 years ago
Other questions:
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into
    11·1 answer
  • Modify the definition of the throttle class on page 35, to create a new throttle ADT, which allows the user of the ADT to specif
    6·1 answer
  • Who knows a website to learn how to code in java?
    7·1 answer
  • interpret the following SQL create table persons (person I'd int, last name varchar (255) first name varchar (255) address varch
    7·1 answer
  • C++ Code Outputs.
    9·1 answer
  • Write a function that simulates the roll of a six-sided dice. The name of the function is rollDice. The function accepts no para
    8·1 answer
  • What are software applications?
    14·1 answer
  • Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
    9·1 answer
  • When you download a file from the internet where should you go to find it?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!