answersLogoWhite

0

With a pencil

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What has the author J Dearden written?

J. Dearden has written: 'Managing computer-based information systems' 'Management information systems'


What ways computer can be fooled on data intergrity?

Data Integrity is a quality control method that ensures that the information going into the computer program is useful to the computer program. Computer programs are written by humans. One reason that computer programs are written is that a human wants a large amount of data to be searched for relevant information. If the program is properly written it will detect information entered that is of little use to the program. Poorly written programs can be fooled by humans that want to enter football scores into a program processing weather information, but why would you want to fool the computer?


What has the author Kausik Bose written?

Kausik Bose has written: 'Information networks in India' -- subject(s): Computer networks, Information technology


What has the author Adam Cobb written?

Adam Cobb has written: 'Australia's vulnerability to information attack' -- subject(s): Security measures, Computer security, Access control, Computer networks, Computers, Information networks


What has the author Julie Delaney written?

Julie Delaney has written: 'Geographical Information Systems' -- subject(s): Geographic information systems, Computer programs


What has the author David J Loundy written?

David J. Loundy has written: 'Computer crime, information warfare, and economic espionage' -- subject(s): Business intelligence, Cases, Computer crimes, Computer networks, Criminal provisions, Information warfare, Law and legislation


What is the use of the hard drive in the computer?

Information is written, and read from the hard drive.


What has the author Richard W Aldrich written?

Richard W. Aldrich has written: 'Cyberterrorism and computer crimes' -- subject(s): Computer crimes, Computer networks, Computer security, Information warfare, International cooperation, Security measures


What has the author Frederick B Cohen written?

Frederick B. Cohen has written: 'A collection of short papers on information protection' 'Protection and security on the information superhighway' -- subject(s): Security measures, Information superhighway, Computer networks, Computer security, Data protection


What has the author Lawrence M Potash written?

Lawrence M Potash has written: 'Effects of retrieval term specificity on information retrieval from computer-based intelligence systems' -- subject(s): Computer-assisted instruction, Information retrieval


What has the author Tai-hoon Kim written?

Tai-hoon Kim has written: 'Advances in computer science and information technology' -- subject(s): Anwendungssystem, Ubiquitous computing, Computer networks, Informationstechnik, Computersicherheit, Informationssystem, Datensicherung, Congresses, Computer science, Biometrie, Kryptoanalyse, Information technology


What has the author Dean Hanawalt Vanderbilt written?

Dean Hanawalt Vanderbilt has written: 'Controlled information sharing in a computer utility' -- subject(s): Time-sharing computer systems