A program developed for a Web store represents customer acc appear to be mathematically imprecise. Which of the following A The account balances are represented using a fixed B The account balances are represented using a fixed The account balances are represented using an unli The account balances are represented using an unlim

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
question 43/44
A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values
appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision?
A
The account balances are represented using a fixed number of bits, resulting in overflow errors.
B
The account balances are represented using a fixed number of bits, resulting in round-off errors.
The account balances are represented using an unlimited number of bits, resulting in overflow errors.
D
The account balances are represented using an unlimited number
bits, resulting in round-off errors.
Transcribed Image Text:A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision? A The account balances are represented using a fixed number of bits, resulting in overflow errors. B The account balances are represented using a fixed number of bits, resulting in round-off errors. The account balances are represented using an unlimited number of bits, resulting in overflow errors. D The account balances are represented using an unlimited number bits, resulting in round-off errors.
Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?
A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's
A
computer using the recorded data.
B
A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user's account.
A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for
multiple accounts, so the user's log-in information for multiple systems may be compromised.
A user receives an e-mail that claims to be from the user's bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly
D
after following the steps, the user discovers that the Web site is fraudulent and that the user's username and password were stolen.
Transcribed Image Text:Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system? A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's A computer using the recorded data. B A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user's account. A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user's log-in information for multiple systems may be compromised. A user receives an e-mail that claims to be from the user's bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly D after following the steps, the user discovers that the Web site is fraudulent and that the user's username and password were stolen.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Binary numbers
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education