Write down the major issues of security and integrity of information. -Technology

1 Answer

Answer :

There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Related questions

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : IT security today has become a major point of concern. What comes under IT security? -Technology

Last Answer : IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

Description : Define information security. -Technology

Last Answer : Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Description : Which of the following are the foundation of all the technical security issues in your information systems? a. Network Infrastructure vulnerabilities b. Information vulnerabilities c. System Infrastructure vulnerabilities d. Network Information vulnerabilities

Last Answer : a. Network Infrastructure vulnerabilities

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Which one is not a security issue of mobile computing? a) Integrity b) Legitimate c) Accountability d) Insufficient bandwidth

Last Answer : Insufficient bandwidth

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

Last Answer : C) Security

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity

Description : Sharvan Joshi is a student of Political Science and is a keen researcher of political issues related to various countries and states. -Technology

Last Answer : 1. Sharvan should develop a blog.2. Twitter and Facebook.

Description : Sharvan Joshi is a student of Political Science and is a keen researcher of Political issues related to various countries -Technology

Last Answer : (a) Shravan should develop a blog.(b) Blogger.Com Wordpress.Com

Description : List down some common usage of Information Technology. -Technology

Last Answer : Common usage of IT includes information storage, data processing and statistical analysis, Word processing, accounting and financial forecasting, management information systems, communication, designing ... control and automation of manufacturing processes, computer programmers, computer sales etc.

Description : Write down the components of a computer network established between the two offices of a company across the cities. -Technology

Last Answer : The five components will be involved in this computer network, since telephone lines will be used as communication channel.1. Sender2. Data communication device at sender’s end3. Communication channel4. Data communication device at receiver’s end5.Receiver

Description : Write down the name of communication channel used for telephone line and TV. -Technology

Last Answer : Communication channel for telephone line is twisted pair cable and for TV is co-axial cable.

Description : Write down the name of communication channel used for telephone line and TV. -Technology

Last Answer : Communication channel for telephone line is twisted pair cable and for TV is co-axial cable.

Description : Write down any two points of differences between LAN, MAN and WAN. -Technology

Last Answer : Two major points of differences among LAN, MAN and WAN are as follows:1. Distance Covered LAN can cover an area upto 5 km. More than 5 km and upto 100 km comes under MAN. Beyond 100 km, the area can be covered by WAN only.2. Cost LAN has lower cost as compared to MAN and WAN.

Description : Write down the steps to insert a new row into the table. -Technology

Last Answer : Insert a RecordSteps to insert a record in a Datasheet View are as follows:Step 1 When you create a table, a new blank record automatically appears in the second row of the table or If you enter ... into the fields.Step 3 When you have finished adding records in the datasheet, save it and close it.

Description : Today, computers are.being used very widely for communication. Write down some benefits offered by computers when used for communication. -Technology

Last Answer : File and Data SharingAt a time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, files can be shared ... different locations. It is a type of online game, i.e. played through social networks.

Description : Write down the advantages of networking for an office. -Technology

Last Answer : Various advantages of networking for an office are as follows:1. Using network we can store our files in many places or computers for data recovery purpose from a disk crash.2.It provides sharing of ... , i.e. they can be centralised and can be accessed by anyone from the central system itself

Description : Write down the name of communication channel used for telephone line and TV -Technology

Last Answer : Communication channel for telephone line is twisted pair cable and for TV is co-axial cable.

Description : Write down the names of the components of multimedia. -Technology

Last Answer : Components of multimedia are text, audio, video, images and animation.

Description : Write down any two hardware requirements for multimedia. -Technology

Last Answer : Two hardware requirements for multimedia are as follows:1. The CPU for a multimedia computer should be Pentium IV or other advanced chips.2. The multimedia PC should be equipped with a monitor having atleast VGA card.

Description : Write down the name of the freehand drawing tools which are using when custom shapes can be drawn. -Technology

Last Answer : Curve, Freeform and Scribble are the three freehand drawing tools which are using when custom shapes can be drawn.

Description : Write down the purpose and features of Show Markup option available in Review tab of Word 2007 document. -Technology

Last Answer : Accepting or rejecting changes work much like the Spell Check feature. By cycling through the changes made to a document, the author can accept or reject any or all changes.For accepting or rejecting ... and (iii) until all changes/comments have been reviewed.5. When finished, save your document.

Description : Which feature is provided by Word to customise the look of a custom shape? Write down the steps involved. -Technology

Last Answer : Drawing Custom ShapesBy using the three freehand drawing tools, i.e. Curve, Freeform and Scribble desired shapes can be created.Curve lets you draw shapes that have different curves. Freeform lets you draw ... your object, to turn off Edit Points, click anywhere on the page outside of the shape.

Description : Write down the steps for Mail Merge operation. -Technology

Last Answer : Sometimes you may need to send similar letter to a large number of people. But, each version of letter is not exactly same so, you may need to sit for hours to draft each letter individually. ... of merging the main text document and the data source which is also refer to as finished documents.

Description : Write down the name of default view in a PowerPoint presentation. -Technology

Last Answer : By default, a presentation screen is always shown in Normal view.

Description : Write down the formula for adding values of cells A1 to A5. -Technology

Last Answer : Formula for adding values of cells A1 to A5 would be =SUM(A1 : A5).

Description : Write down the importance of legend in charts. -Technology

Last Answer : With the help of legend, each data series can be uniquely identified by assigning a unique color or pattern.

Description : Write down the significance of electronic spreadsheets. -Technology

Last Answer : Using electronic spreadsheets, a large volume of data can be stored in worksheets. Worksheets can be managed, edited, viewed, retrieved and printed easily in the desired format. Electronic spreadsheets support charts, which represent data pictorially.

Description : Write down the name and purpose of various components of a chart. -Technology

Last Answer : Various components or parts of the chart are as follows:1. X-axis Refers to a horizontal axis, which is also known as category axis.2. Y-axis Refers to a vertical axis also known as ... Data label Provides additional information about a value in the chart, that is coming from a worksheet cell.

Description : Write down the salient features of SOUL. -Technology

Last Answer : a. SOUL: software for universities library, integrated library management software, developed by, INFLIBNET, an organ of UGC; Consists different modules.b. UNICODE based multi ... on single window operationINFLIBNET has appointed regional coordinators for supports and assistanceAffordable cost.

Description : Write down the salient features of KOHA. -Technology

Last Answer : a. KOHA open source Integrated Library Management Software, developed by Katipo Communications for Horowhenua Library Trust in New Zealand; different modulesb. Easy interface for both users and librariansc ... , MARC21 and UNIMARCi. Administration of software is strongj. Web compliantk. Free of Cost

Description : Write down the full forms of the following: i. URL ii. IDE -Technology

Last Answer : i. Uniform Resource Locatorii. Integrated Development Environment

Description : Write down any two benefits of net banking. -Technology

Last Answer : (i)Banking can be done anytime i.e. 24x7.(ii) Its fast and hassle free.

Description : Write down any one benefit of pair programming. -Technology

Last Answer : Improved code quality: As second partner reviews the code simultaneously, it reduces the chances of mistake.

Description : Write down any one situation where waterfall software process can be used. Also mention one advantage and one disadvantage of waterfall -Technology

Last Answer : Situations to use/apply waterfall model(i) When project is small(ii) When problem is static.(iii) Clear and fixed requirements. Stable problem definition. Technology is static.Advantage :Simple and easy to understandDisadvantage :No working software till the last phase

Description : Write down any one situation where spiral delivery model can be used. Also mention one advantage and one disadvantage of spiral delivery model. -Technology

Last Answer : Situations to use/apply spiral model When project is large,When releases are required to be frequent,When risk and costs evaluation is important For medium to high-risk projectsAdvantage-Additional ... becomes easy as the prototype building is done in small fragmentsDisadvantage-Risk of not meeting

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : Name two other means of online security measures. -Technology

Last Answer : Digital signature and Digital certificate

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.