answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jasenka [17]
2 years ago
3

Read the scenario and decide which type of banking service is the top priority for each

Computers and Technology
1 answer:
Alborosie2 years ago
6 0

Answer:

1. internet banking service

2. savings service

Explanation:

You might be interested in
Imagine a business where there are no clear boundaries defined for data and systems ownership. As a security professional, descr
laiz [17]

Answer:

Loss of confidentiality, integrity and Availability

Explanation:

First I would start by explaining data ownership and system ownership

<u>Data ownership</u>:

Such an owner is responsible for safeguarding data, has all rights and complete control of the data. He or she can transfer data responsibility to someone else

<u>System ownership</u>:

The responsibility here is system maintenance, taking care of system functionalities, updating system and system software.

<u>Lack of data ownership</u>:

1. This affects privacy of data as there would be no one involved in the monitoring and taking care of the data. It would be at risk as sensitive information may get out and data may even be modified.

2. Lack of data ownership could bring about inconsistency in data

3. Lack of data ownership piles up risks to data which may cause great loss to data eventually.

<u>Lack of system ownership</u>:

1. There would be no one available to take care of issues that may come up with the system

2. If system gets to be outdated, it becomes open to malware and hackers

3. Work will be unable to be completed on the system.

<u>Loss of CIA triad</u>

CIA stands for confidentiality, Integrity and Availability

1. Without data ownership there would be access to data which is unauthorized. This brings about loss in confidentiality, and there could be issues with data availability

2. If system gets malware at the absence of system owner then there would be loss in confidentiality, integrity. Hackers would take control of the system and they would be able to use data.

3 0
2 years ago
Using evidence to dispel myths or false beliefs is one way to move closer to evidence-based practice. Please select the best ans
Marrrta [24]
The correct answer is TRUE
7 0
2 years ago
Read 2 more answers
As a twist on the Hello World exercise, you are going to be the end user of the Hello class. This class is designed to greet the
Flura [38]

Answer:

Here is the Hello class:

public class Hello { //class name

     private String name; //to store the name

     

      public Hello (String names) //parameterized constructor

      { name = names;  }  

     

      public void English() { //method to greet user in english

           System.out.print("Hello "); //displays Hello on output screen

           System.out.print(name); //displays user name

           System.out.println("!");  }  //displays exclamation mark symbol

           

           public void Spanish(){ //method to greet user in spanish

               System.out.print("Hola "); //displays Hello on output screen

               System.out.print(name); //displays user name

               System.out.println("!"); } //displays exclamation mark symbol

           

         public void French() { //method to greet user in french

              System.out.print("Bonjour "); //displays Hello on output screen

              System.out.print(name);  //displays user name

              System.out.println("!");  } } //displays exclamation mark symbol

           

Explanation:

Here is the HelloTester class:

import java.util.Scanner; //to accept input from user

public class HelloTester { //class name

 public static void main (String[]args)  { //start of main method

String name; //to store the name of user

Scanner input = new Scanner(System.in);  //creates Scanner class object

System.out.println("Enter name?" );  //prompts user to enter name

 name = input.nextLine(); //scans and reads the name from user

 Hello hello = new Hello(name); //creates Hello class object and calls constructor by passing name

hello.English(); //calls English method using object hello to greet in english

hello.Spanish(); //calls Spanish method using object hello to greet in spanish

hello.French(); } }  //calls French method using object hello to greet in french

The output of the program is:

Enter name?                                                                                                                    user                                                                                                                           Hello user!                                                                                                                    Hola user!                                                                                                                    Bonjour user!  

The screenshot of the program along with its output is attached.

4 0
2 years ago
Joe runs a handyman service. He enjoys writing and keeping up on the latest trends. He wants to share this information with his
Step2247 [10]

He is looking to create a blog.

8 0
2 years ago
Enter a formula in cell G5 that calculates the difference between the attendance totals for 2018 and 2017. Copy the formula to t
Allushta [10]
This is done by a very simple formula: the only thing you need to type is =x-y where x is the cell that contains the total of 2018 and y being the cell that contains the total for 2017. If both are numeric values you can use the formula = A1-B1 and get your result. Your <span>cells don't have to be in the same order as your formula.</span>
4 0
2 years ago
Other questions:
  • Mary is writing an article about the animal kingdom. She wants to place image below the text. Which menu should Mary choose for
    15·2 answers
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • Column, bar, pie, line, and scatter are all types of_____
    9·1 answer
  • Match the following technologies with their applications.
    9·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Define a function PyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the vo
    7·2 answers
  • Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The follow
    7·1 answer
  • covers a wide variety of applications such as web and computer-based training (CBT), and social networks. a. E-learning b. Model
    10·1 answer
  • 63:47 One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malfor
    15·1 answer
  • Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!