d) legitimate programs e) None of the above (10) ESTION 2 te e or False next to
ID: 3914986 • Letter: D
Question
d) legitimate programs e) None of the above (10) ESTION 2 te e or False next to it. E.g. 2.11 True whether the following statements are Tru e or False. Write down the question number and the word Systems theory provides a means of analysing and improving business processes within and between systems Application software is a form of software that manages and controls the operation of the computer system as it performs tasks on behalf of the user. A LAN consists of a single network segment or several connected segments that are limited in extent. Analogue data are continuous in that an infinite number of values between two given points can be represented. Ethics can be described as acting to meet the standards set by a profession in terms of individual conduct, competence and integrity. Many companies are building defences against the spread of viruses by de-centralising the distribution and updating of anti-virus software. Internet and other online E-mail systems are one of the favourite avenues of attack b spreading computer viruses or breaking into networked computers. Firewalls can completely prevent unauthorised access (hacking) into computer networks A worm appears as a legitimate program in order to gain access to a computer s Ha ckers are often described as individuals who seek to break into systems as a test of their abilities. 68 PROGRAMME HANDBOOK: JANUARY 2018 INTAKEExplanation / Answer
2.1 False
2.2 True
2.3 true
2.4 false
2.5 true
2.6 true
2.7 true
2.8 True
2.9 false
2.10 false
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.