1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
10

which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?

Computers and Technology
1 answer:
Dmitry_Shevchenko [17]3 years ago
4 0

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

You might be interested in
What is the meaning of local storage?​
Anastaziya [24]

Answer: Local Storage: A hard drive or solid state drive directly attached to the device being referenced. Local Storage would be used to contrast the storage in that unit from the storage on servers in the local network or on the Internet (like cloud storage).

3 0
3 years ago
Mail merge requires an MS Word document in order to work.<br><br> True<br> False
Kipish [7]

True is correct. Hope it helps


3 0
3 years ago
Read 2 more answers
Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
Marianna [84]

<u>In DBMS comparison normally end user compare the following this</u>

1. Cost effective.

2. How much storage capacity

3. Number of concurrent users or connection.

4. Extend storage capacity

<u>Explanation:</u>

Normally end users compare DBMS such as oracle, MySQL, sqlserver, MS access, and postages sql and mongo db.

If it is document oriented or image search best is mongo dB or clouch db, for best relationship management of DBMS such as oracle, MySQL server extra.

For colonial adventure tours and DBMS I would suggest either mongo dB or oracle all depends on organization.

7 0
3 years ago
Which of these is a programming best practice?
iris [78.8K]

Answer:

v1

Explanation:

8 0
3 years ago
Read 2 more answers
Help me Please Due today
Fittoniya [83]

Answer:

1. Syntax search looks for matching documents that contain one or more specific words

2. quotation marks can be used to make a keyword search more specific when looking for a specific phrase

3. Boolean operators can be used to broaden (OR) or narrow (AND) a search

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which option represents the location of the Data Table function?
    12·1 answer
  • is this website just for a bunch of lazy kids bumming off answers? Because if that were the case I'd be one of them.
    9·1 answer
  • Microsoft Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kinec
    6·1 answer
  • Which of the following is not a standard method called aspart of the JSP life cycle*
    9·1 answer
  • Parts are described by partnum, color, and price. Parts can be subassemblies as well and this means that they contain other part
    12·1 answer
  • What is the different between 32bit anf 64 bit verision​
    11·1 answer
  • What would be the desired output of the home-security system
    8·1 answer
  • An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
    12·1 answer
  • You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discre
    8·1 answer
  • At currents as low as
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!