There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
Answer:
<em>Package software is developed by computer technicians. modified or changed if there is need because these software are custom-built. Tailored Software- Tailored software is the software that is developed as per the specifications and requirements of the users.</em>
Explanation:
hpithlps.
Answer:
Mainframes
Explanation:
Mainframes are utilized by many major corporations and government agencies. They are also used in banking, accounting, and healthcare to name a few.
The basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.
Explanation:
- A ROM, non-volatile memory, does not use to store data, but RAM is volatile and requires power to store data.
- ROM is not given usually as a specification, but RAM is typically specified when buying a computer.
- We can write data only once in ROM. However, once it is written, we can read it any number of times. RAM is the main memory in a computer, and read from and write to it much faster than other storage types. RAM is used to store files in use on the computer.
Hence the basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.