The following are the methods of file security except
...The following are the methods of file security except
hacking
use of password
Use of back up
Use of Anti-virus
Correct answer is A
The methods of file security are
- Use of back-ups
- Use of anti-virus
- Password
- Proper label of storage devices
The two types of operating system are ...
In Microsoft Excel, sheet tabs can be renamed by ______ ...
Napier's Bone was designed purposely for calculation of? ...
The following are examples of synchronous communication, except? ...
The act of translating data into a secret code is known as? ...
The following are input devices except ...
How many binary digits are contained in 10MB of a memory stick? ...
The main advantage of intellectual property right is? ...
The use of satellite to transmit signal information to the earth is enabled with the use of? ...