List security measures that should be taken to prevent unauthorized persons from using the computer system.

What will be an ideal response?

Security measures are:

a. The server computer is locked in an area only accessible to authorized personnel.

b. User I Ds and passwords are used to access menus and programs. Coded user I Ds restrict access to update and inquiry functions.

Computer Science & Information Technology

You might also like to view...

____ bundles mutually supporting government initiatives into a single coordinated effort to ensure the security of cyberspace and includes the establishment of a coordinated national capability to identify and remediate computer vulnerabilities.

A. CHCI, 2008 B. CCNI, 2008 C. CNCI, 2008 D. CICN, 2008

Computer Science & Information Technology

Java ____________________ is the machine language of the JVM.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology