1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
14

A discount store chain has a data breach, which means that a hacker now has the credit card numbers of every customer who shoppe

d at that store in the last month. As a result, customers are angry with the store because they have to respond to credit card fraud, and so sales decrease at the store. Which of the following would have most likely prevented this problem?
A
investing in faster processors

B
investing in more mainframes

C
investing in better security

MULTIPLE CHOICE
Question 10
Which of the following is NOT a way that a company can improve the security of the data that it collects?
1Points
A
increasing its upload speed

B
requiring stronger passwords

C
encrypting information

MULTIPLE CHOICE
Question 11
Which of these statements describes the difference between binary and decimal numbers?
1Points
A
Binary numbers are shorter to write than decimal numbers.

B
Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

C
Binary numbers are easier for people to read than decimal numbers.

MULTIPLE CHOICE
Question 12
Which of these number systems uses the most unique characters?
1Points
A
binary

B
decimal

C
hexadecimal

MULTIPLE CHOICE
Question 13
If you saw the number BDB76B used to describe a color in a computer program, which number system is being used?
1Points
A
decimal

B
hexadecimal

C
Roman numerals

MULTIPLE CHOICE
Question 14
Why are hexadecimal values used to represent color in computer programs?
1Points
A
They are easier for humans to interpret.

B
They are easier for computers to interpret.

C
They are able to represent more colors than binary numbers.

MULTIPLE CHOICE
Question 15
Processor speeds are given in hertz. One hertz refers to what?
1Points
A
one transfer from binary to hexadecimal

B
one use of an input device

C
one fetch-decode-execute cycle
Computers and Technology
2 answers:
timofeeve [1]3 years ago
7 0

Answer:

1. B -  investing in more mainframes

2. A -  increasing its upload speed

3. B -  Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

4. A - binary

5. B - hexadecimal

6. A - They are easier for humans to interpret.

7. B -  one use of an input device

Explanation:

1. giving infromation out and anyone can just get it from the mainframe

2. increasing the upload speed is NOT a security improvement because encrypting is very hidden can be found anymore and stronger passwords are required everywhere even google account passwords so A is the answer

3. no explantion I just know thats true I swear.

4. Its A because its difficult to read so its unique. very rare people know how to read it.

5. hexadecimal is the only one that has numbers and letters together

6. Hexadecimal representations use fewer digits than binary, making it easier to express values.

7. One per second

Sloan [31]3 years ago
4 0

Answer:

C

investing in better security

A

increasing its upload speed

A

Binary numbers are shorter to write than decimal numbers.

B

hexadecimal

B

They are easier for computers to interpret.

C

one fetch-decode-execute cycle

You might be interested in
In the SQL environment, a _____________ is a logical group of database objects – such as tables and indexes – that are related t
Paha777 [63]

Answer:Schema

Explanation: A schema is the group that contains objects of databases with views, index, triggers, tables etc features. The specific user can access schema who persist a certain username.The user is considered as the owner of the database and its element.

Schema is usually bound to have only single database.There are some schema that are already present in the system as the in-built schema .E.g.- sys, guest etc.

5 0
3 years ago
computer has a 32-bit instruction word broken into fields as follows: opcode, six bits; two register file address fields, five b
lina2011 [118]

Answer:

a.  2^6, or 64 opcodes.

b.  2^5, or 32 registers.

c. 2^16, or 0 to 65536.

d.  -32768 to 32768.

Explanation:

a. Following that the opcode is 6 bits, it is generally known that the maximum number of opcodes should be 2^6, or 64 opcodes.

b. Now, since the size of the register field is 5 bits, we know that 2^5 registers can be accessed, or 32 registers.

c. Unsigned immediate operand applies to the plus/minus sign of the number. Since unsigned numbers are always positive, the range is from 0 to 2^16, or 0 to 65536.

d. Considering that the signed operands can be negative, they need a 16'th bit for the sign and 15 bits for the number. This means there are 2 * (2^15) numbers, or 2^16. However, the numbers range from -32768 to 32768.

6 0
3 years ago
HELP PLEASE!!!! Which development method is best explained in this way: developing a system through repeated cycles and smaller
vlada-n [284]

Answer:

Incremental method.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.

In SDLC, a waterfall model can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

Also, a spiral model can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

8 0
3 years ago
A _____ is a character or group of characters that has a specific meaning. a. field b. record c. file d. database
zubka84 [21]

A character or collection of characters with a specific meaning is called a field.

<h3>What does the technical term "field" mean?</h3>

A field is a purpose-driven, typically fixed-sized section in a fixed or known location within a unit of data, such as a record, message header, or computer instruction. A field may be divided into smaller fields depending on the situation.

<h3>What does a file structure field mean?</h3>

A record is an entire set of fields, a field is a single piece of information, and a file is a collection of records. An analogy between a file and a phone book is a phone book. There is a list of records in it, and each record has three fields: a name, an address, and a phone number.

learn more about field here  

<u>brainly.com/question/28002617</u>

#SPJ4

8 0
1 year ago
Your boss wants you to configure his laptop so that he can access the company network when he is on the road. You suggest a VPN
Rashid [163]

Answer:

All traffic that flows between the laptop and VPN server is encrypted.

Explanation:

A Virtual Private Network (VPN) is a "tunnel" connection between computers that performs just like a regular point-to-point network connection (that is, IP address to IP address).  It has the added feature that encryption is enabled so that no intermediate server (or computer or line monitor, etc.) can decode the information that is in the data portion of the packets.

5 0
3 years ago
Other questions:
  • In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
    10·1 answer
  • Which type of multiplexing divides transmission opportunities into slots of 125 microseconds with position inside each slot rese
    10·1 answer
  • Three uses for Auto Formatting in Word 2016.
    5·1 answer
  • According to the ethical computer use policy, users should be __________ of the rules and, by agreeing to use the system on that
    11·1 answer
  • Can you use public domain images without violating copyright laws?
    5·1 answer
  • When targeting customers of the consumer population at market a product, what type of segmentation information would be most hel
    12·2 answers
  • Which type of system is used to analyze, evaluate, and integrate the output of other systems?
    5·2 answers
  • Is orange named after the fruit or of the color?
    9·1 answer
  • An array, numbers, of integers is filled with 100 random numbers whose values are greater than 10 and less than 255. You DO NOT
    7·1 answer
  • ¿En qué países se ha implementado un sistema de vigilancia a través de drones?, ¿qué aspectos positivos y negativos ha generado?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!