The Eduladder is a community of students, teachers, and programmers just interested to make you pass any exams. So we help you to solve your academic and programming questions fast.
In eduladder you can Ask,Answer,Listen,Earn and Download Questions and Question papers.
Watch related videos of your favorite subject.
Connect with students from different parts of the world.
Apply or Post Jobs, Courses ,Internships and Volunteering opportunity. For FREE
See Our team
Wondering how we keep quality?
Got unsolved questions? Ask Questions

10IS72-INFORMATION-SYSTEMS-->View question


Asked On2017-05-15 00:55:38 by:Rajiv

Taged users:


Likes:
Rajiv

Dislikes:
Be first to dislike this question
Talk about this  Like  Dislike
View all qusetions
Answers

• Security Codes – multilevel password system used to gain access into the system

• Backup Files – duplicate files of data or programs

• Security Monitors – software that monitors the use of computer systems and networks and protects them from unauthorized use, fraud, and destruction

• Biometrics – computer devices that measure physical traits that make each individual unique

• Computer Failure Controls – devices used to prevent computer failure or minimize its effects

• Systems that have redundant processors, peripherals, and software that provide a:

                • Fail-over capability to back up components in the event of system failure

                • Fail-safe capability where the computer system continues to operate at the                        same level even if there is a major hardware or software failure

• Formalized procedures to follow in the event a disaster occurs including:

          • Which employees will participate

          • What their duties will be

          • What hardware, software, and facilities will be used

          • Priority of applications that will be processed

          • Use of alternative facilities

          • Offsite storage of an organization’s databases

Definition:

• Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities 


Answerd on:2015-11-30 Answerd By:arunwebber

Likes:
Be first to like this answer

Dislikes:
Be first to dislike this answer
Talk about this  Like  Dislike

You might like this video:Watch more here

Watch more videos from this user Here

Learn how to upload a video and start earning here



Lets together make the web is a better place

We made eduladder by keeping the ideology of building a supermarket of all the educational material available under one roof. We are doing it with the help of individual contributors like you, interns and employees. So the resources you are looking for can be easily available and accessible also with the freedom of remix reuse and reshare our content under the terms of creative commons license with attribution required close.

You can also contribute to our vision of "Helping student to pass any exams" with these.
Answer a question: You can answer the questions not yet answered in eduladder.How to answer a question
Career: Work or do your internship with us.Work with us
Create a video: You can teach anything and everything each video should be less than five minutes should cover the idea less than five min.How to upload a video on eduladder