a.on , off
In most computer processors, electron movement is controlled by tiny switches that turn this flow of electricity on and off...zero represents off and one represents on
Answer: Yes
Explanation:
Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system
- According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.
- Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
Answer:
b. erroneous processing can result in the accumulation of a great number of misstatements in a short period of time.
Explanation:
Because of the consistent nature of processing in computers, this is capable of creating certain kinds of risk. From the option, one of the probable risk that can result from consistent information processing for multiple transactions at the same time is erroneous processing. This can therefore lead to a pile of misstatements in only a short period of time.
Answer: Posture assessment
Explanation:
Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.
Posture assessment has to do with how the system security is evaluated based on the applications and the settings.
Answer:
- Operating System.
- Laptop.
- Convertible computer.
- Peripheral.
- Desktop Computer.
Explanation:
Operating system is a software that manages the hardware and the software in the system and provides the interface between machine and the user.
Laptops are the portable computing devices which you can carry with you.
Convertible computer have a keyboard that is detachable and can be converted into a tablet.
Peripherals are devices which we can attach to the computer.
Desktop computer is a computing device that not portable at all.