Answer:
True is the correct answer to the above question.
Explanation:
- An application program is used for specific tasks. It is a program with some specified lines of instruction which instruct the computer to process any task.
- When a user wants to create an application program or project then he can do it with the help of four parts. which are as follows:-
- There needs some presentation which can be called as front-end, which is the graphics interface for the user of that program. It facilities the user to drag and drop options for the user of the project.
- The second thing is data storage, which is used to store the data of the project.
- The third thing is data access logic, which is used to create a logic to extract or add the data to the database.
- The fourth thing is application logic which is used to send the data or present the data to the user in front-end design.
- The above question-statement also wants to states the same which is described above. Hence true is the correct answer to the above question.
Answer: Logical security list
Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.
These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.
The answer is B Okay good luck and dont...mess it up
Answer:
C
Explanation:
Based on the information provided within the question it can be said that the best way to accomplish this would be to digitally sign each timestamp and log entry and store the signature. This is because each timestamp and log entry would be ran through a verification algorithm which would then be stamped with your digital signature that requires your private keys, thus preventing forgery.