1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
2 years ago
10

Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field

should contain a number, the system checks the values that a user enters to make sure that the user actually entered numbers. The design also ensures that only authorized users have the ability to move or delete files. What is Arturo attempting to protect
Computers and Technology
1 answer:
Cloud [144]2 years ago
3 0

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

You might be interested in
How do you close a file?
natita [175]
You gave the answer in your question
8 0
3 years ago
Read 2 more answers
1. Keisha is in her first semester of college and is taking 10 credit hours: ACA 122, CIS 110, PSY 150, and developmental math.
serious [3.7K]

The advice is that she should not give up and that she should relax, and think of the time she comprehend more and then start to read. Another is to hire a private tutor to help or put her through.

<h3>What does a private tutor do?</h3>

A private tutor is known to be a person who is a specialist that has been trained in helping students known more and take in the concepts and details of any given course work.

Therefore, The advice is that she should not give up and that she should relax, and think of the time she comprehend more and then start to read. Another is to hire a private tutor to help or put her through and she will pass her exams in flying colors.

Learn more about private tutor from

brainly.com/question/6950210

#SPJ1

7 0
1 year ago
A network with 6 bits remaining for the host portion will have how many usable hosts?​
Readme [11.4K]
<span>A network with 6 bits remaining for the host portion will have 62 usable hosts. The netmask is </span><span>255.255.255.192/26, the shorthand is [6-bit] which is equal to the number of addresses as <span>= 62 hosts + 1 bcast + 1 net base</span></span>
6 0
2 years ago
1. What arguments can you make for the idea of a single language for all programming domains
SVEN [57.7K]

Answer:

The answer to this question defined below.

Explanation:

It's a smart idea to get a common language for coding of every kind. It would help all developers and customers understand the language better because, in every case, there's no more need to learn, that language.  

  • This could also render software developed in the very same language consistent, and therefore, ports on multiple platforms are not required.
  • In this process, we talk about the common property and function of the classes, that's why it is the correct answer.
3 0
2 years ago
This Command to insert copied text anywhere in your document
harina [27]

Answer:

Paste

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • Help please fast
    6·2 answers
  • PLEASE HELP!! Kou converged his Word document to a PowerPoint document. When he received the PowerPoint, he was missing material
    12·1 answer
  • Select the correct answer.
    6·1 answer
  • What are 25 items that trees made?
    6·2 answers
  • Which is the OS that can be obtained for free or at a much lower price than other major operating systems?
    15·2 answers
  • The default print setting for worksheets is________
    13·1 answer
  • Select the correct answer. Which is the bottom-most layer in the OSI model?
    9·1 answer
  • Employers are looking for an employee?<br>​
    9·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!