Sunday, March 15, 2020

buy custom Secure Systems essay

buy custom Secure Systems essay Computer security refers to the measures undertaken to protect computer information and property against theft, natural disasters and malicious intentions such as corruption of information. The security system adopted is meant to ensure that only eligible users access the information and computer rooms. Organizations all over the globe adopt various computer security systems that, they deem provide maximum security. Therefore, numerous computer security systems could be chosen. For instance, use of passwords, encryption of data, use of firewalls, locking computer rooms after use, installation of alarms in computer rooms, physical protection by use of security guards.. All these measures would ensure that computer information and properties are secure. There is a growing threat of computer security, which systems are the most secure? According to research, computers security could be ensured by use of passwords. These are the secret codes and numbers that are developed to secure computers against unauthorized individuals. Passwords would ensure that only eligible persons log in to retrieve the desired information. Research asserts that passwords could be actual words or any other desirable character. Lehtinen, Russell, Gangemi (2006) intimate that in order to ensure that computer security is achieved through passwords, the organization should develop unique codes for each department. In addition, passwords should not be leaked to outsiders or unauthorized individuals in the organization as this would lead interference with the information. Each computer and information should be assigned a password that is easy to memorize. Passwords should not be saved in the computers because they could be easily discovered and used for the retrieval of confidential information. Research asserts that individuals must consider the strength of the password before resolving to use it before resolving to adopt it. Attackers through guessing could easily crack weak passwords; therefore, accessing the hidden information. Password effectiveness would also be enhanced by taking care of computer viruses. According to Stallings Brown (2008) an antivirus should be installed in the computer, to ensure that passwords are not affected leading to the ultimate loss of vital information. In cases where passwords have been leaked out, the organization should act faster to change them. Changes would ensure that the original password does not log into the information. This will promote a high degree of protection to organizational details intended for competitive advantage and other vital gains. Data intended for transmission should be encrypted to enhance its security. Data encryption refers to the process by which the information being transmitted is transformed into a read only form using a decryption key. According to research, the decryption key ensures that information being transmitted through the network is safe because one cannot access it without the key used. Information would be safer in case the secret key is only shared among the communicators. This means the intended recipient thus averting any interference or loss of information would only access the information. Gollmann (2011) asserts that the protocols in the database will be protected through encryption thus, ensuring that the principles governing communication are observed to the latter. Encryption would be suitable where the information is shared via the internet, there are many users with different characters and some would want to read and alter the information. Computer users should ensure that they regularly update the encryption to enhance its efficiency. Straub, Goodman, Baskerville (2008) observe that lack of regular updating would lead to loss of vital information or the exposure of the encryption key to unauthorized individuals. Research asserts that encryption is one of the vital computer protection mechanisms because it includes many technicalities especially in the access to information. Under this system, all the information in the database would be safe as it is transmitted. Firewalls are used to enhance computer security. These filters allow communications only under certain circumstances. Research asserts that they are helpful because they eliminate unauthorized network users from accessing the information. According to Newman (2009), firewalls work under rules where they only allow the authorized individuals to access the required information. The rules governing the functioning of firewalls are vital because they determine and weigh clients before allowing for connection. They only connect the authorized networks and eliminate those deemed unauthorized and corruptive to the system information. The clients host name is compare to the existing rules and validity determined. Firewalls provide the owner with numerous warnings in cases where unauthorized attempts to access the information has been made. This would provide for a room, to take corrective measures and ensure enhanced protection. Drab (2011) intimates that in order to ensure firewalls work pr operly, the server should continuously update them. They should not be allowed to run out time. According to research, the secrecy of the computer system would be enhanced by strategically placing the firewall betwee the public network and the organizations intranet. This will make sure that information is filtered before getting into the public domain. The information would not be in a position, to be interfered with because of the control measures existing between these two networks. The closure of computer rooms after use boosts computer security. This is a protective mechanism that ensures computer rooms with valuable information are kept under lock and the keys safely kept. According to research, the organization should not allow its employees to carry the keys to computer rooms freely. Delloite (2011) asserts that keys should be kept at designated places within the organization. In cases where computer rooms are left open, thieves could get in and take away the machines leading to loss of vital information. They could easily take computers perceived to be carrying the organizations strategic decisions; this will retard everything and could lead to negative publicity if the information is altered for personal interest. Unlocked doors could also motivate unauthorized individuals to get into the computer rooms and read the organizations secrets. All this would lead to loss of vital information to outsiders and competitors. Wilshusen (2009) observes that computer rooms should also be closed when vital information is being processed. The system should ensure that the real individuals working on the information access the room. In cases where the keys to the rooms are lost, faster action should be taken to ensure that new padlocks and keys are bought. This is to ensure that lost keys are not used to access the rooms. This security measure would be enhanced by making sure that well made doors and windows are used. Metallic doors are more preferable because they cannot be brought down and in cases of theft, it would be easy to tell. Research asserts that the locking of computer room doors would reinforce other measures put in place because there is no entrance into the place making sure that no passwords are lost. Installation of alarms in computer rooms would promote computer security. Organizations have embraced alarms to boost computer security. These devices warn the concerned individuals of any unauthorized interferences. According to Pooch, Fisch, White, Gregory (1996) alarms should be strategically placed in computer rooms and should be able to detect unauthorized access. Alarms are supposed to work perfectly by raising a concern in advance. Organizations use alarms especially in the prevention of crimes relating to computer loss. The alarm system of protection is effective especially when the computer operator is far away from the computers. Alarms would ensure that they gets to the rooms in time and prevent any form of crime. Research asserts that alarms would be effective if set at secret points where no one can access them. Alarms are vital due to their automatic nature of operation; they are not supposed to be controlled but automatically detect unauthorized individuals and raise a call. The alarm should be regularly checked to ensure it functions to the maximum. Pooch, Fisch, White, Gregory (1996), intimate that any deviations in its working should be sense and corrective measures taken to increase its efficiency. The alarm system of protection would be vital in large organizations where operations are dispersed. This is because of the large distance covered by the alarms warning. A central control system should be set up to oversee the operations of alarms and make sure they are not interfered with. They should always be modified to achieve the desired quality and continued efficiency. Human security is a vital security measure. This is a physical protection measure for computers. This is a system where guards are employed and assigned the different sections in the computer areas. They would be there to ensure that only authorized individuals get access to the computer rooms. Individuals are supposed to identify themselves before getting into information processing rooms. Guards ensure that computers are safe from thieves. According to research, they provide maximum security, which would ensure not all computer system is interfered with. Lehtinen, Russell, Gangemi (2006) observe that human security is vital in computer protection because it provides a more physical sense of protection as guards are able to look at the vents as they occur. Strict guards would ensure all the computers are safe by ensuring that everyone getting into the rooms is frisked and ordered to give the purpose for the visit to computer rooms. This kind of system would provide an automatic bar rier to malicious individuals especially if the guards are not subject to being changed through bribes. Under this security measure, organizations should consider it necessary to move or change the guards if there are any signs of conflict of interest. This would make sure that quality protection is achieved thus, putting off any fears of computer losses. Research asserts that human security would be vital especially in large organizations to complement other security measures. Human beings would provide security to both the computer information and machine theft. The security provided by guards is trustworthy because of its physical nature. Guards should also be fairly paid to ensure quuality work is done. The adoption of wireless transmission ensures computer security. Wireless transmissions would be vital in keeping off hackers. This is because they mostly depend on physical means to access data transmitted over the networks. This security measure would ensure that data transferred across the networks is as intact as possible. Hackers and other unauthorized individuals are not able to access the information and alter it because they are unaware of the source and contents. This vital security measure would ensure the organization is in a better position, to communicate and exchange information over long distance without fear of loss of confidentiality. Wilshusen (2009) points out that a stronger wireless transmission is adopted to boost the protective quality of the information. The transmitted information would thus be received in the desired format. Research asserts that the use of wireless transmission would ensure that the information is transported at a faster rate through the ne twork hence leaving no possibility for interference with the information. Wireless transmission ensures that the intended persons only open the information sent or received. It is a security measure that adopts basic technology leading to reduced costs. Cloud computing is being used as a security system. This method ensures several individuals share information transmission channels. According to research, it is ensures that computers are protected because it helps in the storage of user accounts in a remote database. This will ensure that no unauthorized individual accesses them to change and cause any other kind of harm to the documents. Cyberspace Policy Review (2011) asserts that cloud computing acts as a hindrance for unauthorized individuals willing to access the computer at any point because of the rules and procedures required. It demands numerous authentication details before allowing one to access the information. Stallings Brown (2008) asserts that this security measure works well when managed in an efficient manner. Steps should be taken to ensure that cloud computing is effective. It should not be interfered with because it could lead to the unexpected exposure of secret information. Employees should not be allowed to abuse cloud computing because it would be inefficient in its further operations. According to research, cloud computing should be updated every moment to make sure it is in line with the existing trends. Cloud computing is also used to reinforce other security measure such as passwords due to its demand for such codes before access is allowed. In addition, it protects the initial details of all the information that is sent. There are many computer security systems. All of these methods are vital because they complement each other in ensuring the safety of computers. They are all vital techniques of ensuring there is a maximum security to the computers. According to research, all the computer protection systems have positive and negative sides. For instance, passwords could be easily forgotten leaving to the loss of vital information. Firewalls are negative because they could easily malfunction and lead to the loss of data. Computer threats are on an increase, but it is difficult for one to determine the best to use among the large collection. According to research, no method is better than the other is. This is because all computer protection systems carry both positive and negative impacts. Cyberspace Policy Review (2011) asserts that there is no protection system superior to the rest because they mainly complement each other in their operation. Research indicates that, for the success of an organizati on, all these methods need to be unified for maximum security, to be achieved. None of the methods is self-reliant. This is enough to prove that there is no instant of superiority among all the methods. They should be incorporated and complemented to achieve the best for the organization. In conclusion, computer security refers to the undertaking of steps to protect computer information and machines against losses. There are numerous computer security systems. Passwords are helpful in ensuring that unauthorized individuals do not access secret information. They supposed to be regularly altered in cases of discovery. Firewalls are security measures that are used to filter information and respective users. It ensures that the information is only available to legal users. Alarms provide an efficient form of security especially in machine theft. They cover large distances and are suitable for computer theft prevention in large companies. Human security is a form of physical security that could be adopted to protect computers. They protect both data details and machines from losses. Guards could be regularly changed and rotated to ensure that they work and deliver efficiently. Organizations are using cloud computing as a security technique. Under cloud computing, one is no t able to access details as they are stored in the remote database. Wireless transmissions are vital security measures that deny hackers an opportunity to alter information. Computer protection methods are numerous, and there is none that is superior compared to others because they continuously depend on each other for success. Buy custom Secure Systems essay

Friday, February 28, 2020

Leadership in ethics Essay Example | Topics and Well Written Essays - 250 words

Leadership in ethics - Essay Example The only area where ethics and research goes well is in areas where the people involved are professional and consequently have an obligation while carrying out their activities. This change in genes is known as gene-environment contact and is very critical in leadership determination. There are areas where ethics may go wrong or fail to present the results previously expected in a research and the researchers are forced to lie. One of these areas is in the field of science. The field is quite challenging and this is because of the many processes involved. When these scientists find out that they do not have the ability to go through all the processes they end up presenting fraud information that is a non-ethical activity. The corruption is an identification of a genotype that does not have leadership traits (Neve, 2013). Another area where the ethics may fail in research is in the field of catering. Catering is critical in every society and consequently people get to live better lives. Ethics fails in this environment and this is because some people fail to treat their customers in a noble

Wednesday, February 12, 2020

Arts and Crafts Movement in America Essay Example | Topics and Well Written Essays - 500 words

Arts and Crafts Movement in America - Essay Example Many eminent designers and their works have contributed to the success of Arts and Crafts movements in America. As Boehm points out, in Cincinnati, socially prominent women, like Mary Louise McLaughlin engaged in overglaze decoration of ceramic pieces at the Cincinnati School of Art. Her works were sent to the Centennial Exposition where she expanded her knowledge into Oriental pottery and French barbotine with underglaze decoration in colored slips. Later in 1879, McLaughlin started the Women’s Pottery Club, and flourished in the crafting field. There were other women too taking the initiative in the reform, like the Newcomb College Pottery, started in 1895. Another designing group that got flourished before the Arts and Crafts movement was the Rookwood Pottery. It was founded by Maria Longworth Nichol, the granddaughter of Cincinnati real-estate millionaire, Longworth, in an old schoolhouse in 1880 and named it after their family estate. Within a few years from its birth, th e Rookwood Pottery started to succeed and thrive. They produced several thousand pieces and held a dominating place in the market. The pragmatic attitude in production boosted up the developments of the organization into becoming a commercially successful one with obtaining gold medal at the World’s Fair in Paris In 1889. Realistic attitudes taken by the Rookwood Pottery had a great influence on the Arts and Crafts Movement in America. Prominent potters such a George Ohr had demonstrated his skills on the formation.

Friday, January 31, 2020

United States History Essay Example for Free

United States History Essay The years from 1929 to 1945 played a big role in the history of the economy, political and social development in the United States. The paper discusses the controversial Great Depression in the United States as well as the country’s involvement in World War II. The important details are written and studied here. INTRODUCTION In 1929, the United States of America has been involved in its own controversies as well as affected the many other countries of the world because of the downfall of its economy. The Presidents of the United States in the controversial periods were involved in trying to uphold the economic situation in the country as well as being a powerful country around the world at that time. The United States of America had to face the Great Depression and WWII at the same time. Only then did the economy and political stability of the country was regained. Isolationism is a foreign economic policy stance applied by the 29th and 30th presidents of the United States, Warren Harding and Calvin Coolidge respectively. This is one policy that many historians blame for the stock market crash in 1929 since it applies the laissez-faire approach. It was also said that the isolationist attitude of the Americans at that time were displayed by both presidents. In the latter years, leaders under the administration of President Roosevelt grew sentiments for the same idea of isolationism. Herbert Hoover took office as the 31st president of the United States of America from March 4, 1929 – March 4, 1933. During his presidency of the United States, the stock market crash of 1929 happened. He believed that interfering with the economy is not a part of the government responsibility and was accused by some critics of taking laissez-faire stance. Due to his disregard of the economic crisis on the nation, many Americans lost their jobs and homes and he was rated very poorly among all the presidents of the United States (Krugman, 2008). Many people believed that President Hoover had huge responsibility in salvaging the country from Great Depression after taking over the presidential office. On the other hand, there are many who believe that he also did well as the president of the US especially in the midst of the economic crisis. His being the Secretary of Commerce before being the president is the standard basis on this argument (Reich, 2008). The Crash of 1929 is undoubtedly one of the most celebrated events that transpired in the economic stability of the United States of all time. The first time the stocks went low continuously is also known as the Black Tuesday. It was on October 29, 1929, just a few months after President Hoover took office. American investors lost billions of dollars worth of investments in a matter of one month. One reason that caused the stock market crash seen by the historians was the rampant buying on margin practice of the people in 1929 as well as confluence factors. Hooverville is what the shanty towns around the United States are called. The Americans who suffered greatly from the Great Depression ended up building shanty towns in America. These towns were named after the President Herbert Hoover by Charles Michelson, chief publicity of the Democratic National Committee. (Kaltenborn, 1956) There were also other notable events that happened within the period of 1929 and 1945. One of these is the Bonus Army also known as the Battle of Anacostia Flats which occurred in June, 1932 where the World War I veterans camped in demonstration outside Washington D. C. during the Hoover’s presidency. One of the important names to note of during this period was Franklin Roosevelt, the 32nd President of the United States of America. He served the United States of America as president from March 4, 1933 to April 12, 1945. He was a figure of the century for being the president to battle the economic crisis as well as the World War II. Under his presidency, he made the New Deal for the recovery of the economy, unemployment and for the reforms the system of the American banking. The New Deal (1933-1936) was a promise from President Roosevelt to the American citizens during his nomination address. After taking office, President Roosevelt immediately worked to provide the Americans what he promised them in his nomination speech. The new deal he had for the country was for the immediate relief. The banks were in panic and so he immediately proposed bill that will put the bank into financial stability. In the New Deal of President Roosevelt, the continuation of major relief program was included. However, it was named as Federal Emergency Relief Administration. The New Deal agencies were the Civilian Conservation Corps, Agricultural Adjustment Administration and the Federal Trade Commission. He also expanded the former President Hoover’s agency, Reconstruction Finance Corporation. Recovery on the economic situation was through federal spending. The reformation of the economy was passed on the 1933 National Industrial Recovery Act (NIRA), whereas the unanimous decision of the U. S. Supreme Court found it to be unconstitutional. However, the president opposed the decision of the Supreme Court. The Banking Holiday was declared by then new President Roosevelt after him taking the seat into office. As the president, he called special Congress session to institute the mandatory bank holiday that would last for four days. The holiday was to give way for the federal inspections of banks on their financial security. The Emergency Banking Relief Act (March 9, 1933) and the amendment of the Trading with Enemy Act are part of the reform under the Roosevelt administration. There was a Second New Deal after the congress election in 1935 bringing more legislation. The â€Å"Alphabet Soup† or the Alphabet Agencies refers to the many acronyms and abbreviations the legislation, programs and agencies linked with President Roosevelt’s New Deal. It was named coined after the alphabet soup noodles. The acronyms and abbreviations the Alphabet Soup refers to the following: Agricultural Adjustment Administration or AAA which is to provide federal subsidies to farmers creating numerous new jobs through the Civil Conservation Corps or CCC, Civil Works Administration or CWA, the Public Works Administration or PWA, and the Tennessee Valley Authority or TVA. The Federal Emergency Relief Administration or FERA was also established to provide relief on the state level, while the National Industrial Recovery Act or NIRA was passed to salvage nations failing factories. Huey P. Long of Louisiana was a senator from January 25, 1932 – September 10, 1935. He is the major critic of the president’s New Deal. According to him, the New Deal that the president was offering at that time is not doing any help for the betterment of the Americans’ situation. He has a totally different principle from Roosevelt. He believed that the Great Depression was because of the income inequality therefore proposing that the tax levy on the rich American must be bigger so that the normal families will survive. He was popular during the first term of President Roosevelt but was assassinated in 1935. From the beginning of World War II in 1939 during the administration of President Roosevelt, rationing system was applied in the United States. This system was applied to gasoline because of the shortage in the Eastern states of America. The reason for this is because in those years, petroleum products were carried by tankers. The dangers on tankers carrying petroleum were faced with operating U-Boats just off the US coast. Moreover, the speed limit of 35 mph to save fuel was imposed. In 1942, tires were also rationed because of the interruption on the supplies of natural rubber. By November in 1943, almost all the basic commodities were supplied to the people through rationing. The bombing of Pearl Harbor on Sunday, December 7, 1941 by the Japanese Empire opened the involvement of the United States Military to World War II. After the military involvement of the United States in World War II, the need for arms and cooperation of the Allied countries’ civilian forces had developed the informal term of home front. This means that the country at war and so are the populace of the country if need be. Hiroshima is the first city in the empire of Japan that was attacked by the United States of America with the nuclear weapon named â€Å"Little Boy†. The attack was made on August 6, 1945 under the executive order of the U. S. President Truman. Over 140,000 people were killed in Hiroshima. The nuclear bombing followed in Nagasaki on August 6, 1945. After six days, the Japanese Empire surrendered to the Allied Powers. On September 2, 1945, the Instrument of Surrender was signed ending the Pacific War and the World War II. Germany signed the Instrument of Surrender also ending World War II in the Europe. REFERENCES: Foner, Eric. Give Me Liberty!. (2004). W. W. Norton Company. New York City. ISBN 0-39-397873-5 Krugman, Paul. (December 28, 2008). Fifty Herbert Hoovers. New York Times. Retrieved May 9, 2009. http://www. nytimes. com/2008/12/29/opinion/29krugman. html? _r=1. Reich, Robert B. (May 2008). Interview with Robert B. Reich. The Duncan Group, Inc. Retrieved May 9, 2009. http://www. duncanentertainment. com/interview_reich. php Kaltenborn, Hans. (1956). It Seems Like Yesterday. G. P. Putnam’s Sons. New York City. Page 88. Emergency Banking Relief Act of 1933. (1933). U. S. Statutes at Large (73rd Congress, 1933). Documents of American History. Retrieved on May 10, 2009. http://tucnak. fsv. cuni. cz/~calda/Documents/1930s/EmergBank_1933. html. Roosevelt, Franklin D. (July 2, 1932). Roosevelts Nomination Address. Franklin and Eleanor Roosevelt Institute. Retreived May 10, 2009. http://www. feri. org/archives/speeches/jul0232. cfm. Hawley, Ellis. The New Deal and the Problem of Monopoly (1966) Fordham University Press. p. 124 World War II Rationing. AmeHistoricalSociety. Retrieved May 10, 2009. http://www. ameshistoricalsociety. org/exhibits/events/rationing. htm#items. Adams, S. Crawford, A. (2000). World War II. First edition. Printed in association with the Imperial War Museum. Eyewitness Books Series. New York, Doring Kindersley Limited. Hakim, Joy (1995). A History of Us: War, Peace and all that Jazz. New York: Oxford University Press. ISBN 0-19-509514-6.

Thursday, January 23, 2020

Internet Users Turn Addicts :: essays research papers

If you're an Internet user, you know who you are. They are among all of us in society, although many may choose to not acknowledge that they too, frequently use the Internet. As I sit here and look across the street, I see a man in front of his own computer; the screen glowing against the window behind him. He does not use his personal computer for work, he is a farmer. He has become what is known as an "Internet Junky".The addiction begins innocently. At the start, you are not even aware of the possibilities that may form from your excessive computer use. You begin to take an avid interest in e-mailing with your friends and family. Once the novelty of keeping in touch with your colleagues wears off, and researching starts to bore you, you may possibly expand your computer usage to chatting. Yes, chatting. It is something that is becoming more acceptable in our lives, but it is still looked down upon by many skeptics. Chatting through the Internet involves choosing an appropriate nickname for yourself (IE: Fisherman), and then finding a room where you feel compelled to spend time in. Once you've entered the room, other fellow chatters may say, "Hello...a/s/l (age/sex/location) please." And so begins the addiction. Once you become involved in meeting people online, it is difficult to break such a habit. You may even make a daily habit of it. People have been found to carry out exactly the same behavior, not only across the nation, but across the globe. In any one room, you may come across people from five different countries of the world. Granted, not everyone who stays online for hours on end, are enveloped in chatting, but it is more often then not, the cause for Internet Addiction Disorder (IAD). (Goldberg, MD)The prevalence of Internet Addiction Disorder has been increasing in number, hence a support group, among many, The Internet Addiction Support Group (IASG) has been developed. IAD, a "maladaptive" pattern for Internet use, is leading to impairment and/or distress caused by three (or more) of the following, at any time in a period of one year: "A) A need for markedly increased amounts of time on Internet to achieve satisfaction, B) Markedly diminished effect with continued use of the same amount of time on Internet.", C) Reduction in Internet use which has been prolonged. (Goldberg,

Wednesday, January 15, 2020

Beginner Essay

Is each of the following an absolute pathname, a relative pathname, or a simple filename? a) Mile_co b) Correspond/business/milk_co c) /home/max d) /home/max/literature/promo e) .. f) Letter. 0210 2. List the commands you can use to perform these operations: a. Make your home directory the working directory b. Identify the working directory a. cd; b. pwd 3. If your working directory is /home/alex with a subdirectory named literature, give three sets of commands that you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents. 4. The df utility displays all mounted filesystems along with information about each. Use the df utility with the –h (human-readable) option to answer the following questions. $ df -h Filesystem Size Used Avail Use% Mounted on /dev/hda1 1. 4G 242M 1. 1G 18% / /dev/hda3 23M 11M 10M 51% /boot /dev/hda4 1. 5G 1. 2G 222M 85% /home /dev/hda7 564M 17M 518M 4% /tmp dev/hdc1 984M 92M 842M 10% /gc1 /dev/hdc2 16G 13G 1. 9G 87% /gc2 a. How many filesystems are mounted on your Linux system? b. Which filesystem stores your home directory? c. Assuming that your answer to exercise 4a is two or more, attempt to create a hard link to a file on another filesystem. What error message do you get? What happens when you attempt to create a symbolic link to the file instead? Following are sample answers to these questions. Your answers will be different because your filesystems are different. . six; b. /dev/hda4; c. ln: creating hard link ‘/tmp/xxx’ to ‘xxx’: Invalid cross-device link. No problem creating a cross-device symbolic link. 2 Answers to Even-Numbered Exercises 5. Suppose that you have a file that is linked to a file owned by another user. How can you ensure that changes to the file are no longer shared? 6. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on your system. . Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users are on your system? d. How many different login shells are in use on your system? (Hint: Look at the last field. ) e. The second field of /etc/passwd stores user passwords in encoded form. If the password field contains an x, yo ur system uses shadow passwords and stores the encoded passwords elsewhere.