Answer:
option b and c are correct answers.
Explanation:
Let see each option in detail.
a) Sending email is not a risk.
b) Granting access is a problem because the other person can undermine the network
c) Unknow senders can send virus or other malicious code to corrupts you data.
d) Unwanted advertisement is not a big deal.
Answer:
This code is written in MATLAB.
function [result] = isPalindrome(array,length)
if length == 0 || length == 1 %if the array is empty or contains only one element, the array is a palindrome
result = 1;
else
for i = 1:length/2 %check all the elements forward and backward until the middle is reached
if array(i) ~= array(end+1-i)
result = 0;
return
end
end
result = 1;
end
Explanation: Please read the comments in the code. In MATLAB, Boolean values are 1 or 0 instead of True or False.
Answer:
Increased.
Explanation:
An information system interacts with its environment by receiving data in its raw forms and information in a usable format.
Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.
Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.
Additionally, an information system comprises of five (5) main components;
1. Hardware.
2. Software.
3. Database.
4. Human resources.
5. Telecommunications.
Reliance on information and communications technologies have increased potential vulnerabilities to physical and cyber threats and potential consequences resulting from the compromise of underlying systems or networks.
In order to mitigate this physical and cyber threats, information systems usually have an encryption, authentication and authorization system integrated into them.
Answer: a potentially toxic chemical found in thermal grease used for the processor’s heatsink
Explanation:
Exposure to Beryllium oxide can lead to it being inhaled which can cause irritations to the nose, lungs and throat. If this exposure is prolonged, a more serious condition known as Berylliosis which can lead to lung damage. This makes it a potentially toxic chemical.
Beryllium oxide is useful in electronic production due to it having good thermal conductivity whilst also possessing good insulation properties in relation to electricity. This enables it to be used as a filler in thermal grease.