1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
8

Jose para is an application programmer employed by the law firm of Am, Bulance, & Chasr. AB&C is a relatively small firm

with a small number of application programmers for its mainframe computer system, so Jose also acts as the system programmer for that system. which of the following statements is correct for AB&C:
(a). AB&C's accounting system logs all transactions that are entered. This feature is a compensating strength for the weakness that Jose is both an application programmer and a system programmer and will provide sufficient security.
(b).Since Jose is the system programmer, Jose can more than likely override any system security and provide himself with unlimited access to application programs and data.
(c).AB&C's accounting system logs all access attempts to application programs. This feature is a compensating strength for the weakness that Jose is both an application programmer and a system programmer and will provide sufficient security.
(d).Since Jose already has write access to application programs in his function as application programmer, his function as system programmer will more than likely provide him no additional access.
Computers and Technology
1 answer:
NISA [10]3 years ago
8 0

Answer:

The correct answer in this question is option (B).

Explanation:

In the question, it is given that Jose para is an application programmer and he also acts as the system programmer. He will override any system and provide the security and access to application programs and their data. In a law firm only one employee work as a system programmer and an application programmer. So It is difficult to overcome the serious internal control weakness. Except for option (B) all the options wrong. So the correct answer to this question is Option(B).

You might be interested in
What can you find the under the privacy policy section of a shopping website?
masya89 [10]

The privacy policy will tell you what the site will do with your information.

7 0
3 years ago
When presenting, which tool would you use to highlight and magnify a section of the slide?
marysya [2.9K]
Well, the word magnify means to zoom, so I assume the correct answer is B. the zoom tool.
You would use this tool to zoom in your text which may be small, or to draw your audience's attention to specific details in your presentation. You would use the same tool to highlight a part of your slide.
7 0
3 years ago
Read 2 more answers
DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.
Elina [12.6K]

Answer:

False

Explanation:

DSL(Digital Subscriber Line) :-It is a technology in which user gets high bandwidth connection over ordinary telephone lines.

This technique uses data modulation to achieve higher throughput over the telephone lines.Telephone lines carry voice signals over a small range of frequencies between 300 and 3300 Hz. So the frequencies that are higher are unused and available for data transfer.

DSL connection uses a modulation technique based on amplitude or phase modulation. With the help of modulation techniques DSL uses these unused higher frequencies.It uses frequency range higher than 300 to 3300 hz.

5 0
4 years ago
The first computer was developed by the government to spy on communist activities. Please select the best answer from the choice
allsm [11]
The answer is False.

The first computer was not developed to spy on communist by the government. The first computer was announced in 1946, the ENIAC (Electronic Numerical Integrator and Computer). It was built for general purposes like solving large mathematical problems. The US Army designed the computer to  calculate the artillery firing tables.
3 0
3 years ago
Which networking model can the network now support that it could not support without the addition of the eighth computer?
ValentinkaMS [17]

I guess the correct answer is cliеnt-sеrvеr mοdеl

Thе cliеnt-sеrvеr mοdеl is a distributеd cοmmunicatiοn framеwοrk οf nеtwοrk prοcеssеs amοng sеrvicе rеquеstοrs, cliеnts and sеrvicе prοvidеrs. Thе cliеnt-sеrvеr cοnnеctiοn is еstablishеd thrοugh a nеtwοrk οr thе Intеrnеt.

Thе cliеnt-sеrvеr mοdеl is a cοrе nеtwοrk cοmputing cοncеpt alsο building functiοnality fοr еmail еxchangе and Wеb/databasе accеss. Wеb tеchnοlοgiеs and prοtοcοls built arοund thе cliеnt-sеrvеr mοdеl arе:

  • Hypеrtеxt Transfеr Prοtοcοl (HTTP)
  • Dοmain Namе Systеm (DNS)
  • Simplе Mail Transfеr Prοtοcοl (SMTP)
  • Tеlnеt

Cliеnts includе Wеb brοwsеrs, chat applicatiοns, and еmail sοftwarе, amοng οthеrs. Sеrvеrs includе Wеb, databasе, applicatiοn, chat and еmail, еtc.

4 0
4 years ago
Other questions:
  • The fossilizing process that replaces organic matter with silica or calcite is:
    13·2 answers
  • What are the three most important jobs of an operating system?
    8·1 answer
  • Which of the following behaviors is considered ethical? copying another user’s password without permission hacking software to i
    9·2 answers
  • Which of the following is a variable expense for many adults?
    11·2 answers
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • What are the characteristics of good blogs?
    8·1 answer
  • PLEASE HELP ME FIX THIS CODE.
    10·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • Why does my wifi keep disconnecting and reconnecting?
    9·1 answer
  • HURRY GANG 100points!!!! How can you determine which hardware brands and models are the most reliable?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!