1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
11

Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that ca

n occur. Suggest a pre-ventive control. a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.) b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled. c. Because of occasional noise on a transmission line, data being transferred is lost or garbled. d. An intruder is temporarily delaying important strategic messages over the telecommunications lines. e. An intruder is altering electronic messages before the user receives them.
Computers and Technology
1 answer:
sineoko [7]3 years ago
7 0

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

You might be interested in
Im a beginner programmer. what languages should i learn and how do i get better
anyanavicka [17]

Answer: Python, Coding, JavaScript and there's more out there but it's been a while since I have taken Tech classes in a while!

Explanation: I recommend you use typing.com and code.org for coding! I don't know how else to answer this question but this was all I could say!

3 0
2 years ago
In order to communicate between devices inside a computer?
labwork [276]
Seems to be a CPU, central processing unit

Handles transactions between on-board memory, as well as I/O (input/output) devices.
4 0
3 years ago
Write a function MaxMagnitude with two input parameters, that returns the largest-magnitude value. If the inputs are 5 7, the fu
irakobra [83]

Answer:

The program to this question can be given as:

Program:

#include<stdio.h> //define header file

//#include<stdlib.h> //define header file  

#include<math.h> //define header file

int MaxMagnitude (int n1, int n2) //define function.

{

 int largest_magnitude_value= 0;

 if (abs(n1) > abs(n2))  

 {  

   // largest_magnitude_value

  largest_magnitude_value= n1;

 }

 else

 {  

   //largest_magnitude_value

   largest_magnitude_value=n2;

 }

 return largest_magnitude_value; //return value.

}

int main()  //define main function  

{

 int n1,n2,x;

 //define variable.

 printf("Enter first number :");

 //message

 scanf("%d",&n1);

 //input first value from user

 printf("Enter second number :");

//message

 scanf("%d",&n1);

    //input second value from user

 x=MaxMagnitude(n1, n2);  

//variable holds function return value

 printf("largest magnitude value  is =%d",x);

 //print value.

 return 0;

}

Output:

Enter first number : 5

Enter second number : 7

largest magnitude value is =7

Explanation:

The description of the above C program can be given as:

  • the above program firstly we define the header file in this we define the "math.h" header file that is a part of the "stdlib.h" that stands for standard library. This file includes math function, memory allocation, process control, and others.
  • Then we define a function that is "MaxMagnitude()" function.The return type of this function is int. I this function we pass two integer values that use the conditional statement to check which value is greater. In if block we use the absolute() function that returns an absolute value that holds in a variable that is "largest_magnitude_value".
  • Then we define the main function. In this, we define 3 integer variable that is n1,n2, and x. In the n1 and n2, we take value form the user and pass the value to the function in calling time and use x variable to print function return value.
6 0
4 years ago
What scientific principle would a plumber need to know when designing and installing plumbing a new construction
Volgvan
Diong reasearch to know what your dion
7 0
4 years ago
Instant messaging allows text only <br> a. True <br> b. False
xenn [34]
False!                           

There are other things you can do like send pictures and etc.
6 0
4 years ago
Other questions:
  • Imagine you are writing a personal fitness program that stores the user's age, gender, height (in feet or meters), and weight (t
    10·1 answer
  • How many fonts are there in a theme?<br> A. 1<br> B. 2<br> C. 4<br> D. 5
    10·1 answer
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • A ________ refers to specific content of a field.
    7·1 answer
  • A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
    6·1 answer
  • Houston want to have a quick conversion with his friend about an upcoming school activity. which type of website would be most u
    12·2 answers
  • Which group on the home ribbon contains commands to control the alignment of text in a document?
    15·1 answer
  • Can i get any information on this website i'd like to know what its for ?
    11·1 answer
  • What is the typical drive letter for the hard drive?
    12·1 answer
  • Objective a right turn true or false?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!