The following are the methods of file security except
...The following are the methods of file security except
hacking
use of password
Use of back up
Use of Anti-virus
Correct answer is A
The methods of file security are
- Use of back-ups
- Use of anti-virus
- Password
- Proper label of storage devices
Modem computers Compared to earlier computers are ? ...
Which of these is not a programming language ...
How are the stages of SDLC implemented? ...
Examples of quantitative data type are? ...
Which of the following is a temporary file that can be used only once and then discarded? ...
In database application, the field length determines the? ...
The outcome of a processed data in a computer is known as ...
The file access method illustrated in the diagram above is called? ...
Which of the following factors limits access to computerized file system? it ...