____ is known as unauthorized access to the system. 

a) Decryption b) Encryption c) Hacking d) None of the above

1 Answer

Answer :

 Hacking is known as unauthorized access to the system. 

Related questions

Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill

Last Answer : a. Art

Description : ____ is known as allowing the authorized access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer : Decryption is known as allowing the authorized access to information. 

Description :  ____ is known as restricting the access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Encryption is known as restricting the access to information.

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv

Last Answer : It's D

Description :  ____ is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that ... server.  a) Client-Server network b) Extranet c) Internet d) None of the above.

Last Answer :  Client-Server network is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that stored on the server. 

Description : Information that a computer produces and delivers back to the user is known as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Information that a computer produces and delivers back to the user is known as Output.

Description : In C#, which of the classes are used to access file system  A) File and TextReader B) File and directory C) StringReader and TextReader D) StringReader and directory

Last Answer : In C#, which of the classes are used to access file system  File and directory

Description : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system.  a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above

Last Answer : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system. a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above

Description : Nano Second is the ____.  a) Millionths of a second b) Billionths of a second c) Trillionth of a second d) Thousands of a second

Last Answer : Nano Second is the Billionths of a second

Description : The device that is used to read bar codes is ____.  a) OMR b) Barcode c) MICR d) OCR

Last Answer : The device that is used to read bar codes is Barcode 

Description :  ____ are the examples of pointing devices.  a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above

Last Answer :  ____ are the examples of pointing devices.  a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above

Description : A collection of related records in a database ____.  a) Field b) File c) Both (a) and (b) d) None of the above

Last Answer : A collection of related records in a database File

Description : Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC

Last Answer : Of the following, ____ is not a computer language.  a) MS-Word b) C++ c) COBOL d) BASIC

Description : Of the following, ____ is different from the group.  a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint

Last Answer : Of the following, ____ is different from the group.  a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint

Description : The computer code for interchange of information between terminals is ____.  a) ASCII b) ACSII c) ASICI d) ASIIC

Last Answer : The computer code for interchange of information between terminals is ASCII.

Description : Web address is a unique address to identify ____ on web.  a) Browser b) Website c) Link d) All of the above

Last Answer : Web address is a unique address to identify Website on web. 

Description : False () function ____.  a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above

Last Answer : False () function ____.  a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above

Description : Without the symbol '=' excel will treat the data as ____.  a) Number b) Formula c) Text d) None of the above

Last Answer : Without the symbol '=' excel will treat the data as Text.

Description : Which of the following is correct ____.  a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)

Last Answer : Which of the following is correct ____.  a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)

Description : Of the following is correct syntax in excel ____?  a) REPLACE (old-text, num-chars, Start-num, New-text) b) REPLACE (old-text, Start-num, num-chars, New-text) c) REPLACE (old-text, New-text, num-chars, Start-num) d) REPLACE (num-chars, Start-num, old-text, New-text)

Last Answer : Of the following is correct syntax in excel REPLACE (old-text, Start-num, num-chars, New-text)

Description : Among the following ____ is a logical function.  a) Average b) Count c) ABS d) AND

Last Answer : Among the following AND is a logical function.

Description : What is the shortcut key to display the 'save as' dialog box ____.  a) F8 b) F12 c) F11 d) F9

Last Answer : What is the shortcut key to display the 'save as' dialog box F12.

Description : To find text, formatting and special items ____ is the keyboard short key.  a) Ctrl+g b) Ctrl+h c) Ctrl+f d) Ctrl+a

Last Answer : To find text, formatting and special items Ctrl+f is the keyboard short key.

Description :  In a table to move to the first cell in a row, ____ is the keyboard shortcut key.  a) Alt+Tab b) Alt+Shift c) Alt+Ctrl d) Alt+Home

Last Answer :  In a table to move to the first cell in a row, Alt+Home is the keyboard shortcut key.

Description : What is the keyboard shortcut key to merge a document ____.  a) Alt+Shift+N b) Alt+Shift+O c) Alt+Shift+P d) Alt+Shift+Q

Last Answer : What is the keyboard shortcut key to merge a document Alt+Shift+N.

Description : After copying the content, how many times can you paste ____.  a) Only one time b) Two times c) Three times d) Many times

Last Answer : After copying the content, how many times can you paste Many times.

Description : The smallest unit of computerized data is referred as ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

Last Answer : The smallest unit of computerized data is referred as Bit.

Description : Information that is entered into a computer is called as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Information that is entered into a computer is called as Input.

Description : The following ____ is termed as permanent memory.  a) Random Access Memory b) Read Only Memory c) Flash Memory d) Cache Memory

Last Answer : The following Read Only Memory is termed as permanent memory. 

Description :  ____ is the software that controls all the other software programs and allows to perform basic tasks.  a) Software b) Hardware c) Windows d) Operating System

Last Answer :  Operating System is the software that controls all the other software programs and allows to perform basic tasks. 

Description : The building block for all information that flows through a computer ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

Last Answer : The building block for all information that flows through a computer Byte 

Description : Scanner is ____ device.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Scanner is Input device.

Description : Router is ____ device.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : output

Description :  ____ is a set of instructions, also called a program that tells a computer how to perform tasks.  a) Hardware b) Software c) Both (a) and (b) d) None of the above

Last Answer : a and b because you need a keyboard or something that's hardware to get code flowing which is software

Description :  ____ is the language that computer can understand and execute.  a) Middle Level Language b) Machine Level Language c) High Level Language d) All of the above

Last Answer : the language of a computer is called all

Description : ____ is an internet based computing solution where shared resources are provided.  a) Cloud Computing b) Networking c) LAN d) None of the above

Last Answer : lan