Answer:
A power supply consists of wires connecting the cpu and other parts of the computer. The data bus transfers data between CPU and memory unit.
Explanation:
Answer:
c. just a few weeks to install.
Explanation:
ERP is known as Enterprise Resource Planning.ERP implementation involves software installation, transfer of the financial data to the new system, configuration of the users and processes and training the users on the software.
It also involves upgrades after installation,cross-functional teams, intensive training, high funding for both initial cost and maintenance. This whole process usually takes place between 6 months to 2 years. This makes option C which says it takes few weeks to install incorrect.
Answer:
a) true.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.
Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.
<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>
Answer:
Worm malware
Explanation:
The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.
Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.
Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.