Answer:
b.Information systems architecture
Explanation:
Information System Architecture defines a system in terms of its resources and how they interact with each other. Some aspects of the Information System Architecture include the data that is managed by the system and the architecture of the application software. Another aspect is configuration, which involves the hardware architecture of the system. The organization of the system takes a look at the maintenance of the system while the communication aspect architecture looks at the networks that link the different resources e.g topology diagrams.
Answer:
Option A, B, and D.
Explanation:
In the above question, the some details of the question are missing that is the part of the question.
Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.
So, the following are the option that is true about the scenario.
Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.
Viruses and malware are common and can have drastically negative results on your computer and life.
You can often tell that your computer is infected because it acts weird or slow.
Active antivirus software is a good way to prevent these problems.
sorry i just got banned so delete this answer plz i was banned and i wanted to see if they unbanned me
Answer:
Option A
Explanation:
Option B is rejected because it is used to get the startup network settings, processes extra features used by the network.
Option C is rejected because it is used to check the stats like ping,fps of the network by using a loop back.
Option A is selected because PING command is used to check the data packets transfer rate between two ends using ICMP protocol. Local host means that you are specifying the one end as your side. If the packets are there then it is working else the IP service is down.