A peer-to-peer LAN is an appropriate network architecture for_____?
None of these
Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
Option E You receive Trojan horses though emails, infected webpages, instant message, or downloading services like games, movies, and apps. True Trojan horses are not technically viruses, since they do not replicate; however, many viruses and worms use Trojan horse tactics to initially infiltrate a system. The best way to stay away from Trojans is by making sure you install software from trusted sources.
Which of the following term is used for assurance of the accuracy and consistency of data over its entire life-cycle?
Option A Data integrity is the maintenance of, and the assurance of the accuracy and consistency of data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
Which of the following technology was used in Second Generation of Computer?
To justify text over the height of paper, which option will be chosen?
Page Setup from File menu
From formatting toolbar
Font from Format menu
Paragraph from Format menu
None of the Above
A pop-up window with a warning is known as ______?
A Proxy server is used for which of the following?
To provide TCP/IP
To process client requests for database access
To process client requests for web pages
To provide security against unauthorized users
None of the Above
Option C In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.
A _____ is a software-based security token that generates a single-use login PIN?
Option C A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.
In computing, a _______ is an unexpected termination of a process?
Option D Crashes can happen to individual applications as well as the operating system itself.
SAP is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking. what is meaning of ‘SAP’?
Smart Access Point
Smart At Point
Service At Point
Service Access Permission
Service Access Point
Option E A Service Access Point (SAP) is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking.