1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
12

(20 POINTS) What is one risk of introducing your new information system? Why is it a risk?

Computers and Technology
1 answer:
mixas84 [53]3 years ago
8 0
Hardware and software failure - such as power loss or data corruption.
You might be interested in
How to check if serial interface is dte ot DCE?
Anna11 [10]

If you can see the DTE/DCE cable, you can tell by looking which router has the DCE interface connected to it - the letters "DTE" or "DCE" will either be molded into the connector itself, or if it's an older cable there should be a little piece of tape on the cable that tells you what the interface type is.

5 0
3 years ago
25% of 60 min<br> 20% of 60 min<br> 33%% of 60 min
Alexxx [7]
15
12
19.8 cool cool cool
7 0
2 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
If a web page visitor clears the analytics cookie from their browser, what will occur?
katrin2010 [14]

Answer:

If a web page visitor clears the Analytics cookie from their browser, Analytics will not be able to associate user behavior data with past data collected. ... It will set a new browser cookie the next time a browser loads a tracked page.

6 0
3 years ago
In this section of your final project, you will write a basic script to create and back up files. You will create this script wi
Viktor [21]

Answer:

bjdjdindbdubduf kndjnxjxjfujdjbdjbd bzjbd djbdibdu jdjdidnidndi xubdubdufjksk. xud ufbsjjdi djneibdudbdujfjfbjbdj fu. fjfjjdubdjjdbjd jdbdinkdkdnd. djjdibnfjdkndindundi jdudjbdubd djbdu bdudjdjjd djidndud dudbid anís us dj

4 0
3 years ago
Read 2 more answers
Other questions:
  • How does an ALU perform logical operations?
    6·1 answer
  • (True/False) Utilizing a higher bandwidth can support a larger volume of data (in bits per second) to be transmitted than a lowe
    13·2 answers
  • bad word bad word bad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word
    5·1 answer
  • Why are some studs and bolts undercut in the middle?
    11·1 answer
  • The worst "review platform" (e.g. TripAdvisor, Zomato, Yelp) that can't be trusted?
    14·1 answer
  • Large computer programs, such as operating systems, achieve zero defects prior to release. Group of answer choices True False Pr
    7·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • Which of the following industries utilize computer science?
    13·1 answer
  • Design a program using Python to subtract two numbers
    12·1 answer
  • Please help me to creat flow chart​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!