answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stich3 [128]
2 years ago
13

Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu

ter where its data are stored. Another bank has ten branches spread throughout California , with the data being stored on a mainframe in San Francisco . Which system do you think is more vulnerable to unauthorized access
Computers and Technology
1 answer:
GuDViN [60]2 years ago
3 0

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
You might be interested in
Juan, a network user, sends an email to you, the IT admin of the network, stating that his account is locked because he has lost
slamgirl [31]

Answer:

The correct answer to the following question is Option D.

Explanation:

Already when we authorize an individual to set up a new credential or provide a provisional code or password, we must make ensure that the person is checked. We could allow a verification code after confirming the consumer.

  • Verification remains crucial because an imposter may try to compromise to provide a temporary credential or switch his password by posing as a further person.
  • So, Juan fixes his problem by making sure whether resetting the password has always been allowed by checking that Juan is the one that he claims he is.

8 0
2 years ago
What is retrieved from a search containing two terms separated<br> by the AND operator?
egoroff_w [7]

Answer:

A AND B= 1 or 0

1 1  1

0 1  0

1 0  0

0 0 0

So, as explained above if both are 1 we then only get 1, or else we get 0 always in case of AND which is a logical operator, whose output can be 0 or 1 only. This is being depicted above.

Explanation:

If both are 1 we get 1 or always else, we get the output =0.

8 0
2 years ago
Sea level is the average level of the sea between high and low tide. It is used as a reference point for measuring elevation, or
SSSSS [86.1K]

Answer:

-8 and 735

Explanation:

Since the sea is a body of water (fluid) it takes the same properties as a fluid does which means filling an area and finding a leveled point. This is why we use the sea as a starting elevation point for Earth's land and it is given a numerical value of 0. Since it starts at 0 any land above Sea Level is in the positives while land below Sea Level is in the negatives. Therefore Since New Orleans is 8 feet below sea level its numerical value elevation is -8. The highest point in Chicago is 735 feet above sea level which makes its numerical value 735

6 0
2 years ago
Read 2 more answers
The _______________ domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart
viva [34]
The answer is <span>workstation.   </span>The workstation domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart device in the end user's physical possession and any device accessed by the end user, such as a smartphone, laptop, workstation, or mobile device.
5 0
2 years ago
The ______________________ are incident management personnel that the incident commander or unified command assign to directly s
postnew [5]

Answer:

The Command Staff are the incident management personnel that the incident commander or unified command assign to directly support the command function.

Explanation:

Based on the information retrieved from the ICS (Incident Command System), to handle properly incidents that occur, Command Staff are assigned by the incident commander or unified command.

8 0
2 years ago
Other questions:
  • What is the term for a web site that uses encryption techniques to protect its data?
    12·1 answer
  • The navigation bar on the left side of ____ view contains commands to perform actions common to most office programs.
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Modern operating systems decouple a process address space from the machine’s physical memory. List two advantages of this design
    15·1 answer
  • Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times
    14·1 answer
  • Write a program that reads an integer and displays, using asterisks a filled and hollow square, placed next to each other. for e
    9·1 answer
  • Sean is forecasting the time and cost of developing a customized software program by looking at the number of inputs, outputs, i
    8·1 answer
  • Remember that it is desirable for good block ciphers that a change in one input bit affects many output bits, a property that is
    9·1 answer
  • To be eligible for the leadership training program offered by the office, a student must have at least 2 years of post-secondary
    9·1 answer
  • Write a cout statement that prints the value of a conditional expression. The conditional expression should determine whether th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!