1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
2 years ago
11

Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that ca

n occur. Suggest a pre-ventive control. a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.) b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled. c. Because of occasional noise on a transmission line, data being transferred is lost or garbled. d. An intruder is temporarily delaying important strategic messages over the telecommunications lines. e. An intruder is altering electronic messages before the user receives them.
Computers and Technology
1 answer:
sineoko [7]2 years ago
7 0

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

You might be interested in
Describe how computer are used in ticket counter?​
m_a_m_a [10]

Answer:

These systems are commonly used in facilities such as public libraries to ensure equitable use of limited numbers of computers. Bookings may be done over the internet or within the library itself using a separate computer set up as a booking terminal.

6 0
2 years ago
Would you buy a 2017 SYM WOLF CLASSIC 150 for $2,999?<br><br> Just wondering.
Anika [276]

seeing that its a 2017 it sounds pretty good.... as long as thats really what you want ( you should totally just get a dirt bike lol)

3 0
2 years ago
Data is best described as
viktelen [127]

Answer:

The answer is B

Explanation:

TOOK THE TEST

5 0
3 years ago
Read 2 more answers
Beyond personal self-directed learning, engaging the management team of the technology group is a process of strategic learning
ASHA 777 [7]

Answer:

The statement personal self -directed learning is true because, it is a dynamic learning process that can be both change for the organization and contribute to fresh ideas for potential placement of the company.

Explanation:

Solution

In an organisation the management team plays an important role toward's its growth.

This plays a vital role in meeting up to its long-term targets, forging ahead with passion or determination and making any form of adjustments when necessary.

Management is not just about implementing specified proposals. It calls for the analysis of different critical structure, on spot decision-making. this is about learning and can sometimes lead to newly taught results, sometimes positive other times.

Management refers to being actively and consistently engaged with a group of people who work for them. Successful management entails good team work, support from top to bottom of its hierarchy. It requires leadership over a group of individuals who are expected to execute thoughts and opinions on the organisation.

As a part of the management committee also allows for the team leaders to build individual talent. They learn from their way through the various hiccups they face.

Therefore, aside personal self-directed learning, joining the technology group's management team is a proactive learning process that can be both transformative for the organization and contribute to fresh ideas for potential placement of the company.

5 0
3 years ago
Read 2 more answers
If you type too much text on a PowerPoint slide, the additional text is added to a second slide.
Snowcat [4.5K]

Answer:

This is false

The text just goes out of the slide and you can't see it until you lower the font size or until you delete some of it.

Explanation:

5 0
2 years ago
Other questions:
  • Respond to the following in a paragraph of no less than 125 words. What is the purpose of netiquette guidelines?
    10·1 answer
  • 3. Discuss the disadvantages of file-based systems.
    13·1 answer
  • How is a cell named?
    9·1 answer
  • Which expresses 6y : 9y in its simplest form?
    12·1 answer
  • What types of information are commonly included in headers and footers? Check all that apply.
    10·1 answer
  • Memory cache is referred to as ______. A. SRAM c. SROM b. DRAM d. DROM
    11·1 answer
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    15·2 answers
  • 1. Discuss the pros and cons of human-computer interaction technology?
    6·1 answer
  • Zachary drinks 2 cups of milk per day. He buys 6 quarts of milk. How many days will his 6 quarts of milk last?
    12·1 answer
  • This function returns the length of a string:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!