answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
2 years ago
11

What is the correct flow of a computer system

Computers and Technology
1 answer:
Schach [20]2 years ago
4 0

The use of the machine in the functions of the data process has necessitated an orderly flow of information. The sequence in which the operations were executed would have to be clearly defined, and when combined with the data to which it should be applied, that sequence will create the flow of information.

You can not put much emphasis on the documentation, the record of information. In the written instructions and without the graphic representation of the workflow serious, difficult to carry out a task of data procedure in an appropriate manner. There are several more efficient and organized methods, it is the Flow diagrams that the future programmer understands the necessity of the flowchart :) :) :) :v

You might be interested in
What are threats to computer system
Readme [11.4K]
Theft or vandalism through to natural disasters are physical threats. Non-physical threats target the software and data on the computer systems, Like hackers or just straight up viruses. Also, untrustworthy apps or games can give your computer viruses as well.
3 0
1 year ago
The results of the spec cpu2006 bzip2 benchmark running on an amd barcelona has an instruction count of 2.389e12, an execution t
saw5 [17]

Answer:

CPI = 0.94

Explanation:

The formula for execution time is given below:

Execution time = clock cycles * cycle time

As Execution time = 750 s

clock cycle time = 0.333 ns = 0.333 * 10^-9

so putting these values in the above formula, we get

750 = clock cycles * ( 0.333 * 10^-9 )

clock cycles = 750 / ( 0.333 * 10^-9 )

clock cycles = 2.25 * 10^12

As the results of the spec cpu2006 bzip2 benchmark running on an amd barcelona has an instruction count = 2.389 * 10^12

and the formula for clock cycles is:

clock cycles = number of instructions * CPI

CPI = clock cycles / number of instructions

CPI = 2.25 * 10^12 / 2.389 * 10^12

CPI = 0.94

5 0
2 years ago
There are two cons to an OLTP database. Which of the following are a solution of these cons?​
Delicious77 [7]

Answer:

The answer is below

Explanation:

An OLTP (Online transaction processing) database is a database that allows for quick transaction processing. It involves inserting, deleting, updating data in the database.

OLTP has many drawbacks like if the system fails, all transactions are going to have problems. Also, since multiple users are allowed to access the data, it makes it prone to hackers.

The solution to the problems associated to the OLTP database is the OLAP (online analytical processing) database.

The OLAP systems allow users to analyze database information from multiple database systems at one time thereby allowing analysis for business decisions.

6 0
2 years ago
Frequency of failure and network recovery time after a failure are measures of the _______ of a network.
coldgirl [10]
Frequency of a failure and network recovery time after a failure are measures of the Reliability of a network
8 0
1 year ago
As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (no
Simora [160]

Answer:

A digital forensic investigation is a special case of a digital investigation. Where the procedure and techniques are used will allow the results to be entered into cost of low foreg on investigation may be started to answer a question about whether or not centraband digital images exist on a computer.

Here we are considering the case of Global Finance Company with wide range of financial products and wide range of customers throughout the world. A suspect of compromise has been detected from the manager's computer. Now the team has been deployed to the branch office and conduct the Digital Forensic Investigation.

Concern of the Company

1. Regular updates for application infrastructure and network infrastructure.

2. One branch managers from porisbane branch felt compromises in his computer.

3. Both the servers and work station from all the offices are based on Microsoft Windows.

4. The firewalls and network segmentation are fully implemented.

5. Through intrasion detection and logging exist in the brances these are hardly used.

Digital Forensic Investigation Approach

The audit term of the Global Finacnce Company can follow four step. The digital forensic investigation model stands to be most effective model for investigation of the compromise happened int he reginal branch of the Global Finance Company.

1. Collection

a. All information from the manager's workstation, servers and other workstations must be collected.

b. Obtain all the important informtation.

c. Identify storage context noth internal and external devices.

d. Forensic tools that are applicable and to be used for the investigation are to be listed and made available for usage.

e. Target computer forensic imaging to be done and hashed to check the integrity of data.

f. Line network traffic has to captured.

Digital Evidance Collection done in two stages:

Volatile memory is the temporary memory and primary volatile memory is RAM

By cinning command: Cryptcat6543 -k key

Computer data can now required with the command Cryptcat -1 -p6543 -k key>>

Non volatile Memory Acquisition: Permanent memory or volatile memory stands significant source for the digital forensic investigation.

Parmanent data is collected through both online and offline methods:

Offline data is collected from the hard drive applications tool such as Guymayers etc.

Online data like firewall logs, antivirus logs and domain controller log with help of wires work and ethernal collected.

2. Examination

Once the data collected detailed examination is done by comparing the original and logical copies collected. Such examination gives us clues of how manege for window registry examination. Command used echo text_mess > file1.text : file2.txt

The above file retrieved through the command more < file1.txt : file2.txt

The network forensic is enabled using the tools and techniques so that the following potential information can be accessed.

System Information, Service listing, Process listing, Registry information, Binary dumped of memory

3. Analysis with Assumption

Many tools and methodologies are used by the audit team to analyse the collection and examined evidence. Analysis is done according to the following:

a. Leyword searches in all the files

b. Recovering the deleted files

c. Registry information extraction from the workstation

The tools used in this phase are FTK and ILOOKIX. These tools are helpful to recover the document, chat, logs, emails.

4. Report

The final report is generated by the audit team

Purpose of report Digital Forensic investigation conducted on the compromise of manager's computer

Author of the report Aufit Team

Incident Summery The source of compromise are x, y, x

Evidence All the effected files, registry, log files

Analysis All the analyzed data analyzed

Conclusion All digital evidence are extracted and found from the source

Document support volatile and non volatile data, tools, log info, registry info and so on.

7 0
2 years ago
Other questions:
  • Which of the following blocks is least similar to the others?
    8·2 answers
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • Using Amdahl’s Law, calculate the speedup gain of an application that has a 60 percent parallel component for (a) two processing
    11·1 answer
  • Return 1 if ptr points to an element within the specified intArray, 0 otherwise.
    7·1 answer
  • During the name resolution process, which technique is used to avoid congestion when querying a server
    8·1 answer
  • A variable like userNum can store a value like an integer. Extend the given program to print userNum values as indicated. (1) Ou
    15·1 answer
  • Which of the following statements is true regarding input and output?
    12·2 answers
  • In below freezing conditions, keep your fuel level at least _________ full to keep moisture from freezing in your gas line.
    13·1 answer
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
  • 5.19 LAB: Exact change - functions
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!