IT security today has become a major point of concern. What comes under IT security? -Technology

1 Answer

Answer :

IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

Related questions

Description : which of the following is a major concern for north korea today? -General Knowledge

Last Answer : producing enough food for its people.

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : Shapes option comes under ………… tab. -Technology

Last Answer : Shapes option comes under Picture Tools Formattab.

Description : The Superintendent should examine the ________ to see that all _____concerning the set are neatly and correctly copied in the book, that the book contains no. B. order which does not concern the set, that B ... clerk's, sorters c) guidance book, B. orders, record clerk's, sorters d) None of these

Last Answer : c) guidance book, B. orders, record clerk’s, sorters

Description : When installing applications in iPhone, why does some apps require Apple ID but some others don’t If we enter our Apple ID, does it potentially cause risk as the application own can know our password How to check this security concern?

Last Answer : The application will not be given your Apple ID password when you are prompted to enter it in the app store for download. Typically, if it does not ask for your password, you most likely have ... the word "open" that means that app is already downloaded onto your current device. Hope this helps!

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : I have a small mole on my forehead and today i noticed that it started bleeding. Is this cause for concern? I'm 27 years old...

Last Answer : get it checked out ASAP, put your mind at ease!

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Which is not a major concern of socially responsible consumers?

Last Answer : Price [Apex]

Description : The scroll bar feature comes with scroll arrows that allow you to move easily through a document. -Technology

Last Answer : TrueDepending on the size of a window, the entire application may not be visible. So, it is the scroll bar which makes the whole screen visible for you by using scroll arrows.

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : Name two other means of online security measures. -Technology

Last Answer : Digital signature and Digital certificate

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : Define information security. -Technology

Last Answer : Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : i. select city from training where topic = 'Cyber Security'; -Technology

Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : Why does Clay Purvis become so upset when Jessie shows concern for the kidnapped Africans?

Last Answer : What is the answer ?

Description : Say a person from a long time ago is alive today and you are talking to them. What do you think they are most surprised or shocked about, and how do you explain modern technology to them?

Last Answer : I’d give them to someone else and let them deal with it. Have you tried explaining the internet to an elderly person who has no idea what it is? Imagine someone from the past. ughhh.

Description : Today, computers are.being used very widely for communication. Write down some benefits offered by computers when used for communication. -Technology

Last Answer : File and Data SharingAt a time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, files can be shared ... different locations. It is a type of online game, i.e. played through social networks.

Description : Today people are less aware about software ethics -Technology

Last Answer : Software enables us to accomplish many different tasks with computers. Unfortunately, for various reasons, some people justify making and using unauthorised copies of software. Software ethics refers to ... also includes that the software developers should be given a fair return for their work.

Description : In which year, hacking became a practical crime and a matter of concern in the field of technology? a) 1971 b) 1973 c) 1970 d) 1974

Last Answer : c) 1970

Description : If aesthetic is not a concern what is the first thing to do to treat soreness under dentures, A. Take the denture off for a week B. Rinse the denture in nystatin C. Apply tissue conditioner

Last Answer : A. Take the denture off for a week

Description : If Happy Bags expresses concern that its products are having too great an impact on the pollution of ground water under landfills, this concern is directly related to the firm's: A)social responsibility. B)marketing orientation. C)profitability. D)ethics. E)distribution system.

Last Answer : A)social responsibility.

Description : Give one major disadvantage of bluetooth. -Technology

Last Answer : Only short range communication is possible using bluetooth.

Description : Give one major disadvantage of bluetooth. -Technology

Last Answer : Only short range communication is possible using bluetooth.

Description : Give one major disadvantage of bluetooth. -Technology

Last Answer : Only short range communication is possible using bluetooth.

Description : Mention any one major environmental benefits of ICT to Ms. Megha so that she can utilize it in her future “Save Earth” campaign. -Technology

Last Answer : Major environmental impact of ICT on our society is that it is creating a virtually paperless work environment so reducing cutting down of trees for paper manufacturing.

Description : According to a survey, one of the major asian country generates approximately about 2 million tonnes of electronic waste per year. -Technology

Last Answer : Buy environmentally friendly electronicsDonate used electronics to social programsReuse, refurbish electronicsRecycling e-waste

Description : Will humanity become civilized enough soon enough to survive the dangers of rapidly advancing technology?

Last Answer : I have an issue with the phrase civilized enough' - so I will just address the other portions of your question. Like with anything else, some people are capable of using technology for good of others ... . I don't, however, think this is why no other planet is out there with intelligent life.

Description : When a technology-based company changes its logo... is that a sure sign they've become irrellevent and/or on a trajectory towards bankruptcy?

Last Answer : removed by self-moderation

Description : What took so long for technology to become advanced?

Last Answer : Generations before us made huge advancements as well. The industrial revolution for example. Manufacturing in factories has changed how the entire world operates. Or for Egyptians, I'm sure they used intricate ... I think it's instinctive to think about the future, whether it's accurate or not.

Description : The usefulness of computers has now become a part of humanity. You cannot imagine life without them. (i) Do computers have Weaknesses also. -Technology

Last Answer : (i) Yes, computers have weaknesses. Some weaknesses of computers are lack of decision making power, zero IQ and no heuristics. (ii) Computers are used to listen to songs, send E-mail etc. in daily life

Description : GUI has become a standard way of how to users interact with a computer? Its one feature is WYSIWYG. -Technology

Last Answer : 1. GUI Graphical User Interface WYSIWYG What You See Is What You Get.2. GUI contains icons that represent files, folders and other applications.

Description : The London Science Museum asked 3,000 adults what they couldn't live without. What does it mean when Facebook comes before washing machines?

Last Answer : It means that these people have never really ever been WITHOUT those things.

Description : Which Nintendo DS is best and which one comes with a game?

Last Answer : answer:The original DS Handheld is no longer made. There is currently the DS Lite, DSi, and the XL versions of each (I think) which has a larger screen and is larger overall. Normally, neither of them ... well as Game Boy Advance games. The DSi only plays Nintendo DS games and has a camera on it.

Description : How much will the iPhone be priced at when it comes to India?

Last Answer : Depends on the carrier Apple will choose…

Description : Any idea when the new version of the Iphone comes out?

Last Answer : answer:There are suggestions on various Apple Rumours sites that a 3G version of the iPhone will come out in 2008 in Japan. AT&T CEO Randall Stevenson has also suggested an iPhone with 3G will come out ... them to release a completely new model. They are still making apps and an SDK at the moment

Description : On a wireless home security system, can you mix and match cameras from different brands or styles?

Last Answer : It depends on the software of the system controller. Not all cameras will have the same functionality that the controller is expecting to see. Let me give an example: Let's say that ... language among all security systems and cameras that would ensure the interoperability that you are asking about.

Description : Blackberry Playbook password security?

Last Answer : Assuming you have the latest software these instructions were lifted straight from the manual. 1. On the home screen, swipe down from the top frame. 2. Tap Security > Password. To set a password, set ... switch to On. To change your password, tap Change Password. 3.Complete the fields. 4.Tap OK.

Description : What's a good way to learn network security?

Last Answer : You could go to your local bookstore and buy a book. I’ve probably walked by hundreds of network security books at Barnes & Noble.

Description : It’s the only place in the world where today comes before yesterday. Where is it? -Riddles

Last Answer : Today comes before than yesterday in the dictionary because 'T' comes before than 'Y' in english alphabets.