List security measures that should be taken to prevent unauthorized persons from using the computer system.
What will be an ideal response?
Security measures are:
a. The server computer is locked in an area only accessible to authorized personnel.
b. User I Ds and passwords are used to access menus and programs. Coded user I Ds restrict access to update and inquiry functions.
Computer Science & Information Technology
You might also like to view...
____ bundles mutually supporting government initiatives into a single coordinated effort to ensure the security of cyberspace and includes the establishment of a coordinated national capability to identify and remediate computer vulnerabilities.
A. CHCI, 2008 B. CCNI, 2008 C. CNCI, 2008 D. CICN, 2008
Computer Science & Information Technology
Java ____________________ is the machine language of the JVM.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology