The following are the methods of file security except
...The following are the methods of file security except
hacking
use of password
Use of back up
Use of Anti-virus
Correct answer is A
The methods of file security are
- Use of back-ups
- Use of anti-virus
- Password
- Proper label of storage devices
Computers that are small and low cost are referred to as ? ...
Which of the following programming languages needs no translator for it to run? ...
Computer Monitor is also known as ...
Use the BASIC program below to answer questions 23 to 25 10 LET K = 2 20 LET L = 9 30 LET SUM = 0...
When does the output of a NOR gate =0? ...
Sensitive data can be protected from prying eyes using _________ ...
The algebraic equation for the AND gate with input variables A and B is? ...
What is the least number of 750 MB capacity CD-ROM discs needed to transfer 10 GB size file? ...
Total types of data that can be read by document reader are ...