1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hatshy [7]
3 years ago
10

Which of the following is not an impact device? Joy Stick Track Ball Mouse Printer

Computers and Technology
1 answer:
likoan [24]3 years ago
3 0
A joystick is not an impact device.
You might be interested in
Computer Applications
abruzzese [7]

Answer:

a b e

Explanation:

3 0
3 years ago
5. Many large organizations have had their database system hacked and customer data stolen. How should the security for the data
yawa3891 [41]

Answer:

Security is very crucial for any system. Vulnerability can be exposed on different levels which includes database breach, network level attacks and application level attacks. Different kinds of attacks can be carried out for different components. Attacks carried out on databases are different from other kinds of attacks.  

Attacks on databases can be because of any of the following exposed vulnerability.  

  • Poor system design and weak architecture
  • Incorrect configurations  
  • SQL injection attacks  
  • Weak Authentication
  • Brute Force attacks on user credentials
  • Improper privilege mechanisms  
  • Privilege abuse and excessive access.  
  • Poor design and flaws in programming
  • Data loss and information corruption

Security of database systems should be designed by considering best database security design practices. Network security will ensures that all the networks level attacks are detected and mitigated which includes DDOS attacks, Syn flood attacks, Session Attacks, DOS attacks and web security will focus on detecting and protecting attacks on web applications and on application layer attacks. This includes XSS attacks, XML attacks DOS attacks, DDOS attacks, Slow DDOS attacks, JSON violations, Protocol violations etc. However, Security of database will be different than the rest of security and should be based on following best practices

 

  • Physical and Network Access Security.
  • Access control by managing the database access strictly.
  • Encryption of Data
  • Authentication  
  • Web Application Firewalls  
  • Controlling Database Integrations
  • Manual and Scheduled Backups through secured channels.  
  • Auditing and Logging
  • Reporting and Monitoring

Explanation:

<em>Physical and Network Access Security is essential </em>as the database will be hosted on many physical servers or cloud servers. If the databases are hosted on web or cloud servers and gaining access to such servers will eventually give out root user permissions.

Attackers can have control access of databases as root users if they succeed in getting into physical servers.Use of network firewalls and Intrusion detection and prevention systems will provide security against physical system access.

<em>Access control </em> will allow only specific users to access the database. User Based access control will give restricted or policy based privileges to different users. An user will be allowed to perform only certain actions in such cases which will avoid user-access abuse.  

<em> </em><em>Data encryption</em><em> </em>will make sure that eves dropper will not be able to read any data during transmission or during inter process calls. Authentication mechanisms will help to use strong cryptic authentications for users. Use of great encryption, key exchange and hashing algorithms will harden the security and will make databases robust.  

<em> Web Application firewalls</em> will provide a strong security against SQL injection attacks, database connection flood attacks, other web related attacks which will safeguard the databases at the cloud storage and also will block the attacker by flagging them.  

<em>Best coding practices</em> and vulnerability scanning and assessment will secure all the database integrations. <em>Database integrations</em><em> </em>with other components needs to be carried out with utmost care by making sure to analyse all the impacted areas.  

It is always a good practice to have <em>scheduled and manual backup of databases</em> which will be useful against data corruption because of erroneous user actions. This will ensure that data is safe and can be recovered during toxic situations. This will help to control the damage.  

<em> Auditing of logs</em> to verify all the actions performed on the database by different users is necessary as it will help to analyse any misbehavior or compromised user access. <em>Monitoring and reporting</em> will make sure that only the right user has the right access and also it will alert any attacks on the database system.

8 0
4 years ago
Which of the following is a right of a user of information systems?
Eva8 [605]

Answer:

Option A is the correct option for the following question.

Explanation:

The following option is correct because this option is one of among four rights of the user of an information system which is collectively important for those users who working in any organization, company or firm. It always requires the new and the upcoming features or the function of the system.

Option B is wrong because it is not the right of the user and the right is don't disclose the secrets of your firm or company to any outsiders or any person who are not reliable.

Option C is wrong because it is not the right of the user.

Option D is wrong because it is not the right of the user and it is the responsibility of all computer users to keep their systems fit and fine.

4 0
4 years ago
In performing a SWOT analysis, a firm realized that its managers were untrained to handle the requirements of its new division.
Rufina [12.5K]
SWOT stands for strengths, weaknesses, opportunities, and threats. Being untrained sounds like it would be classified as a weakness.
3 0
4 years ago
GDP measures the production levels of
UkoKoshka [18]

Answer:

A. Standard of Living

Explanation:

Gross Domestic Products (GDP) is a measure of the total market value of all finished goods and services made within a country during a specific period.

Simply stated, GDP is a measure of the total income of all individuals in an economy and the total expenses incurred on the economy's output of goods and services in a particular country. Also, Gross Domestic Products (GDP) is a measure of the production levels of any nation.

Basically, the four (4) major expenditure categories of GDP are consumption (C), investment (I), government purchases (G), and net exports (N).

Hence, the standard of living of the people living in a particular country automatically improves if a nation's level of productivity or production improves; they are able to easily pay for goods and services, as well as save and invest their money.

In contrast, inflation and high unemployment rate are indications of economic downturn, recession and low level of productivity (output) in a country; this would automatically affect the standard of living within such countries.

4 0
3 years ago
Other questions:
  • Lena has secured her online website, which sells fashion apparel. She has taken all the necessary steps by making her website PS
    8·1 answer
  • Give two reasons why it is important to upgrade your browser when a new version becomes available.
    8·1 answer
  • If my 98 dodge ram 1500 truck is dropping RPM's when i stop does that mean i need new throttle body sensors or does it mean i ne
    6·2 answers
  • AI in processing capability of computer yes or no​
    13·2 answers
  • Pedro needs to write a block of code that will repeat a loop six times. Which type of loop should he use?
    14·2 answers
  • Networks and the interconnectivity of media have affected our society in that:
    13·2 answers
  • ______________ memory is a small, high-speed, high-cost memory that servers as a buffer for frequently accessed data
    9·2 answers
  • Why accessing information over the internet is so convenient.​
    11·1 answer
  • Which statement best describes one reason why assembly
    13·1 answer
  • Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!