ITEC 1010 Lecture Notes - Lecture 9: Digital Rights Management, Intrusion Detection System, Copyright Infringement

125 views2 pages

Document Summary

Errors in handling files, including formatting a disk by mistakes, copying an old file over a newer one, and deleting a file by mistake. Inadequate planning for and control of equipment malfunctions. Inadequate planning for and control of environmental difficulties (electrical and humidity problems) Installing computing capacity inadequate for the level of activity. Failure to provide access to the most current information by not adding new web links and not deleting old links: some useful policies to minimize waste and mistakes. Changes to critical tables, html, and urls should be tightly controlled, with all changes documented and authorized by responsible owners. A user manual should be available covering operating procedures and documenting the management and control of the application. Each system report should indicate its general content in its title and specify the time period covered. The system should have controls to prevent invalid and unreasonable data entry.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents