Outline 3 computer system problem that could harm people and propose the way avoid the problem​

Answers

Answer 1
Answer:

Answer:

outline 3 computer system problem that could harm people and propose the way avoid the problemare:_

  1. Computer Won't Start. A computer that suddenly shuts off or has difficulty starting up could have a failing power supply.
  2. Abnormally Functioning Operating System or Software.
  3. Slow Internet.


Related Questions

What technology would you like to use or see developed that would help you be a "citizen of the world"?
___________ are used when an SQL statement has to be executed multiple times in a Python script.aPrepared statementsbCursorscConnectionsdQueries
in C, Print the two strings, firstString and secondString, in alphabetical order. Assume the strings are lowercase. End with newline. Sample output: capes rabbits
Define the function isEven which returns True, if a given number is even and returns False, if the number is odd. Execute the statement isEven(43) and display the output.
Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable. Public class Employee { Private String empID; Private boolean hourly; ) . . _______ { Hourly = isHourly; } } A) public void setHourly(String isHourly) B) public void getHourly() C) public boolean getHourly() D) public boolean setHourly(boolean isHourly)

write a program that calculates the average of a group of 5 testscores, where the lowest score in the group is dropped. it shoulduse the following functionsa. void getscore() should ask the use for the test score, store itin a reference parameter variable and validate it. this functionshould be called by main once for each ofthe five score to be entered.

Answers

C++ program for calculating the average of scores

#include <iostream>

using namespace std;

const int n=5;//As per question only 5 test scores were there

int numbers[5];

void getscore(int i)//defining function for taking input

{

cin >> numbers[i];

while(numbers[i]<0 || numbers[i]>100)//score should be between 0 to 100

{

cout<<"\nThe number should be between 0 to 100\n";

cin>>numbers[i];

}

}

int main()//driver function

{

cout << "Enter 5 scores:\n";

for (int i = 0; i < n; i++)

{

getscore (i);//calling function each time for input

}

int s = 101;

double avg = 0;

for (int i = 0; i < n; i++)//loop for finding the smallest

{

s = numbers[i] < s ? numbers[i] : s;

}

for (int i = 0; i < n; i++) //loop for finding the Average

{

avg += numbers[i];

}

avg -= s;

avg /= 4;

cout << "Average of the four scores are: " << avg<< endl;//printing the output

return 0;

}

Output

Enter 5 scores:

4

5

6

7

8

Average of the four scores are: 6.5

Password is an example of an authentication mechanisms that is based on " what an entity has".True or false?

Answers

Answer:

False

Explanation:

A password in a one factor or multi-factor authentication is a mechanism not of what an entity has but what they know.

One factor authentication makes use of passwords only, to secure a user account. A multi-factor authentication uses two or more mechanisms for securing user accounts. It ask the question of what the users know (for password), what they have (security token, smart cards), and who they are(biometrics).

Answer:

False

Explanation:

The authentication mechanism especially the multi-factor authentication uses three types of authentication form factors.

i. What the entity knows: This includes what the entity knows and can always remember. Such as passwords and PINs

ii. What the entity has: This includes physical items that belong to the entity such as smart cards and token generators.

iii. What the entity really is: This includes natural or body features of the entity such as its thumbprint and its palm which can be used for verification.

According to these three factors, it is evident that password is based on "what an entity knows" and not "what an entity has".

What is not recyclable in a
hybrid car
hydrogen car
petrol car

Answers

There are different aspect of cars that cannot be recyclable. In petrol cars, The aspect that cannot be recycled is  used gear oil, windshield wiper solution, brake fluid, power steering fluid, etc.

This is because they are very toxic substances, as they have lead and poisonous ethylene glycol in them.

  • A lot of electric and hybrid cars often uses different kinds of lithium-ion batteries and nickel metal hydride batteries that are used and not all part are recyclable.

  • In hydrogen car, their fuel cells is not to have some measure of recyclable.  The Fuel cells has some recyclable materials but not all.

Learn more about recyclable from

brainly.com/question/376227

your manager ask you to set up a secure network connection at a remote site which protocol would you use

Answers

Answer:

Remote Access Protocols

Explanation:

Considering the situation above, the most appropriate protocol to use is known as the Remote Access Protocol.

This is because Remote Access Protocol is a combination of techniques and sets of instructions that are used in managing the connection between a remote access server and a remote computer. For example, some of the Remote Access Protocols that can be used are Serial Line Internet Protocol, Point-to-Point Protocol, Point-to-Point Protocol over Ethernet, etc.

Hence, given that a trusted Remote Access Protocol allows people to access a steady, secure connection between desktop sharing and remote access for help desk activities.

Therefore, the Remote Access Protocol can be utilized in setting up a secure network connection at a remote site

What is the most important trait of the first pilot project in the AI Transformation Playbook?

Answers

Answer:

Succeed and show traction within 6-10 months.

Explanation:

Ai (Artificial Inteliigence), also known as machine intelligence, is a branch of computer science that is specialized in making smart machines that are capable of doing human tasks

AI Transformation Playbook is a guide to use AI in enterprises successfully, written by Co-founder of Google Brain, Andrew Ng. In his guide, he unveiled the steps that can be followed to successfully installing AI in enterprises, companies, etc.

The most important trait of the first pilot projects is that it succeeds and begins to show traction within 6-10 months.

In his guide, he summarised five steps to install AI in enterprises. The first step is to 'Execute pilot projects to gain  momentum.'

The most important trait of beginning with AI projects is that it succeeds first before being most valuable projects. The success is important as it will help to achieve familiarity and will help other people of the company to invest in this project more.

This success begins to show tractions within 6-12 months of its success.

When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Answers

Answer:

Costs will cover a need for more customer data. The further explanation is given below.

Explanation:

  • It's the greatest problem for almost every company to provide the data with security.
  • This is possible for highly trained practitioners and the technical staff to take charge of it.
  • Complicated technologies would have been going to run together again to withstand these types of jobs.
  • Such problems play a major part in the decision-making process affecting the law enforcement authorities to locate the suspects to strengthen the organization.
  • To do something like this, there seem to be a lot of other good initiatives out there doing it.

There have been some cases in which major corporations have chosen not to include law enforcement:

  • There are many more electronic corruption going on, including money robbery, asset fraud, as well as machine assaults.
  • In such a bigger case, numerous institutions, such as large-scale ones, have gone through these circumstances to evaluate law enforcement to come to terms with cybersecurity.