Options: Use a protocol to ensure that the system will never enter a deadlock state.
B. Allow the system to enter the deadlock state and then recover.
C. Pretend that deadlocks never occur in the system.
D. All of the Above
Which of the following is(are) true of the EDP auditors?
Options: they should have computer expertise, they will be replaced by traditional auditors in the near future, two of the above, currently, there is a very high demand for them, particularly from firms that use personal computers
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computerâ€™s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1
Options: (A)The tasks that reacts to events that take place in out side world. (B) The tasks that do not reacts to the outside world events. (C) The tasks are independent of the time when it occurs. (D) None of these. 7
Options: defines a source or destination of system data, identifies data flow, represents a process that transforms incoming data flow(s) into outgoing data flows, is a data store-data at rest, or a temporary repository of data