Search
.Management Sciences
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
Related Mcqs:
- Which of the following are the functions of a operating system?
- A. Allocates resources B. Monitors Activities C. Manages disks and files D. All of the above...
- The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________?
- A. robotics B. simulation C. computer forensics D. animation...
- In 1999, the Melissa virus was a widely publicised:____________?
- A. E-mail virus. B. Macro virus. C. Trojan horse. D. Time bomb....
- In world today, most of the computers are_____________?
- A. Digital B. Hybrid C. Analog D. Complex...
- One of the popular mass storage device is CD ROM. What does CD ROM stand for?
- A. Compactable Read Only Memory B. Compact Data Read Only Memory C. Compactable Disk Read Only Memory D. Compact Disk Read Only Memory...
Recent Comments