Answer:
The system that will be more prone to attack or vulnerability is the bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.
Explanation:
Solution
If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable to unauthorized persons or individuals.
The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.
With this example, the chances of vulnerability or attacks increases from the following :
- Accounts payable could be disturbed by changing cash in payment false.
- Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
- Transaction fraud like hacking, masquerading are very common in a networked system.
Answer:
Memory
Explanation:
Memory send commands to the CPU . Alternative modes of memory exist, and each one of them plays an essential role in operating a software machine.Memory is commonly called storage. Either the storage is unstable or non-volatile.
Answer:
O An investigation of the problem and audience
Explanation:
ADDIE stands for Analysis, Design, Development, Implementation, and Evaluation which is defined as an instructional systems design framework that helps to develop training courses.
The main idea behind the development of ADDIE was to provide a good learning experience through structured training methods. But there was a limitation of ADDIE that is, it is not able to recognise or investigate the problems and unable to solve the issues.
Hence, the correct option is "An investigation of the problem and audience".
Answer:
D
A, researchers to communicate
Answer:
I mean I need points but I'm not sure my advice is to look it up or look on y0utube : )
Explanation: