1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
2 years ago
10

Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field

should contain a number, the system checks the values that a user enters to make sure that the user actually entered numbers. The design also ensures that only authorized users have the ability to move or delete files. What is Arturo attempting to protect
Computers and Technology
1 answer:
Cloud [144]2 years ago
3 0

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

You might be interested in
Are all the computer users known as programmer ​
Evgesh-ka [11]

Answer:

Nope

Explanation:

programmers are diff

6 0
3 years ago
Which of the following is not a true statement? You can import a table or a query directly from an Access database into an Excel
Lilit [14]

Answer:

does anybody know this answer?

Explanation:

no nobody does

5 0
4 years ago
A loop within another loop is known as a(n) ____ loop.
Natali [406]
Nested






..................................
4 0
3 years ago
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
As an ICT student teacher using convincing and cogent reasons explain why you think operating system is pivotal in teaching and
dalvyx [7]

Answer:

An operating system (OS) is a software which is responsible for the management of computer hardware, software, and also provides common services for computer programs.

Operating System is pivotal in teaching and learning because:

1. It enables computer programs to run smoothly on various computer devices.

2. The Operating System gives teachers the opportunity to install learning apps on their devices for ease of teaching.

3. It enables students to download and install learning applications, download and upload assignments, etc.

4. The Operating System makes video conferencing for online tuition easy and smooth.

5. It makes computer users to interact with other applications and softwares within a device.

Operating systems are found on many computer devices e.g: mobile phones, video games, PCs, supercomputers, etc.

4 0
3 years ago
Other questions:
  • HELP ASAP!!!!!!!!! ITS A UNIT TEST: WILL MARK AS BRAINLIEST&gt;
    13·1 answer
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • Explain the term remote backup with examples.​
    5·1 answer
  • Simple mail transfer protocol (smtp) uses the well-known port number ______________ by default.
    14·2 answers
  • WHICH OF THESE IS A TYPE OF ETHERNET <br> 802.11AC <br> 1000BASET <br> 4G
    7·1 answer
  • A technique for identifying and tracking assets using technologies such as RFID and smart cards is known as electronic tagging.
    6·1 answer
  • How do you give brianliest
    13·1 answer
  • What is the difference of using Selection Tool and Direct Selection Tool?
    6·1 answer
  • What is communication ????<br>​
    7·2 answers
  • Write the function definition for a function called list_total that accepts a list of integers
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!