The following are the methods of file security except
...The following are the methods of file security except
hacking
use of password
Use of back up
Use of Anti-virus
Correct answer is A
The methods of file security are
- Use of back-ups
- Use of anti-virus
- Password
- Proper label of storage devices
Computers that are portable and convenient for users who travel are known as _________________ ...
The diagrammatic representation of an algorithm is ...
Another word for booting is ...
What is a website main page called? ...
Which of the following isn't used to navigate in a computer? ...
Which of the following devices will not require the use of system software to operate? ...
Which of the following is not a model used in problem solving? ...
A display listing of program options which users can select is called? ...