roszettadean4054 roszettadean4054 06-01-2023 Computers and Technology contestada Which of the following methods can most effectively be used to prevent a logical breach of security? operating system and other system software computer architectural design distributed systems design network design