1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
2 years ago
10

Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field

should contain a number, the system checks the values that a user enters to make sure that the user actually entered numbers. The design also ensures that only authorized users have the ability to move or delete files. What is Arturo attempting to protect
Computers and Technology
1 answer:
Cloud [144]2 years ago
3 0

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

You might be interested in
Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
olga nikolaevna [1]

Answer:

B unheard & unseen

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following transfer rates is the FASTEST?
Usimov [2.4K]

Answer:

The correct answer is 1,480 Mbps.

Explanation:

For this you have to know how to convert bytes to different units.

1,000 Bytes (b)  = 1 Kilobyte (Kb)

1,000 Kilobyte (Kb) = 1 Megabyte (Mb)

1,000 Megabytes (Mb) = 1 Gigabyte (Gb)

and Finally, 1,000 Gigabytes (Gb) = 1 Terrabyte (Tb)

4 0
3 years ago
Which of the following tasks is least effective at preventing a computer virus?
worty [1.4K]
Anti-virus software is set to scan your computer weekly is the least effective.
3 0
3 years ago
Read 2 more answers
Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
-Dominant- [34]

Answer:

The answer is "True".

Explanation:

Integration control is a system selection, which is important to ensure the proper coordination of the different components of the programs. Analogies between conflicting goals and solutions must be made to meet or surpass the needs and wishes of participant groups. This mechanisms use events for identifying, defining, combining, unifying and coordinating software development procedures and events, that's why the given statement is true.

6 0
3 years ago
Imagine you are responsible for making a presentation that includes a representation of the logic flow through a process. You un
svetoff [14.1K]

Answer:

find reliable resources

Explanation:

if you find reliable resources, than you might able to have more help i know im not answering..but im trynna help

3 0
2 years ago
Other questions:
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • While inserting images, the Picture command is usually used to insert photos from a digital camera, and the Clip Art command is
    7·1 answer
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • What other options are there besides jail for 16 year old that commit a crime?
    8·2 answers
  • Questions Presscomion
    9·1 answer
  • Please be my friend. my best and only friend isn't talking to me for some reason
    9·2 answers
  • You want to send an email to members of your team working on a school project. In which field would you put the email addresses
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!