Define information security. -Technology

1 Answer

Answer :

Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Related questions

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : Name two other means of online security measures. -Technology

Last Answer : Digital signature and Digital certificate

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : IT security today has become a major point of concern. What comes under IT security? -Technology

Last Answer : IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : i. select city from training where topic = 'Cyber Security'; -Technology

Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : Define a utility software. -Technology

Last Answer : A utility software is a system software designed to help in the management and tuning of operating systems, computer hardwares and different application softwares.

Description : Describe utility software and also define its types. -Technology

Last Answer : It is a system software designed to help in management and tuning of operating systems, computer hardwares and different application softwares.A single piece of utility software is usually called a ... file system which can be mounted by the operating system and treated as an individual drive.

Description : Define the term DBMS. -Technology

Last Answer : The full form of DBMS is a Database Management System. It is a computer based record keeping system.

Description : Define primary key with an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Define query in the context of database. -Technology

Last Answer : A query is an inquiry into the database using the SELECT statement. These statements give you filtered data according to your conditions and specifications indicating the fields, records, and summaries which a user wants to fetch from a database.

Description : Define forms and what is the need of using them? -Technology

Last Answer : In a database, a form is a window or a screen that contains numerous fields or spaces to enter data. Forms can be used to view and edit your data. It is an interface in the user-specified ... like a paper form. People generally prefer to enter data into a well-designed form, rather than a table.

Description : Define RDBMS. -Technology

Last Answer : RDBMS is a type of DataBase Management System that stores data in the form of relations (tables). Relational databases are powerful, so they require few assumptions about how data is related or how, it will be extracted from the database.

Description : Define database management system. Write two advantages of using database management system for school. -Technology

Last Answer : Database Management System (DBMS) is a collection of programs that enable users to create, maintain database and control all the access to the database. The primary goal of the DBMS is to ... centralized location.2. It provides security to the personal information of the school, stored in it.

Description : Is it necessary to define a field type for a field in MS_Access? -Technology

Last Answer : Yes, it is necessary to define a type of a field while entering data into a field.

Description : Define the term Wi_Fi hotspot. -Technology

Last Answer : A hotspot is a site that offers Internet access over a WLAN via a router connected to a link from an Internet Service Provider (ISP).

Description : Define the AutoNumber data type in MS_ Access. -Technology

Last Answer : AutoNumber data type starts with a number for the first record and it automatically increases the number by a set of amount for each record.

Description : Define primary key. How do you set it in MS_Access? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : When you define a field for a table, which of the following parameters do Access always consider optional? -Technology

Last Answer : (d) Description field of the table is optional, as it depends on the databasedesigner that he/she wants to describe a field or not.

Description : The ………… tag is used to define basic font size for the HTML page. -Technology

Last Answer : Thetag is used to define basic font size for the HTML page.

Description : tag is used to define document body. -Technology

Last Answer : False tag is used to define the document head.

Description : Define height and width attributes of tag. -Technology

Last Answer : The width and height attributes tell the dimension of an image to the browser. Both (height and width) attributes require integer values (dimension of the image in terms of either pixels or percentage of its actual size).

Description : Define various alignments of align attribute with example. -Technology

Last Answer : There are some values of image alignment attribute as follows:Middle AlignmentThis alignment is different in both Internet Explorer and Mozilla Firefox. In Internet Explorer, this alignment aligns the image ... effect reproduction, usually by providing a mechanism for the union of sperm with eggs.

Description : Define the Maximize button. -Technology

Last Answer : The Maximize button in Windows is the middle button with square. It allows the user to enlarge a window, usually making it fills the entire screen.

Description : Define Status bar. -Technology

Last Answer : The bottom line of any window is called Status bar in which an application can display various kinds of status information such as current window’s state, background tasks (such as printing, scanning etc) or other contextual information (such as selection, etc).

Description : Define cellspacing. -Technology

Last Answer : The cellspacing is used to create space between different cells in a table.

Description : Define the and tags. Are these two tags similar? If yes, how? -Technology

Last Answer : tag stands for Table Header. It is used to give headings to the various columns in our table. tag stands for Table Row. It is used to create a row in a table. and tags are not similar. ... . Since, also defines a data cell, which is taken as heading to the columns and the data is boldfaced.

Description : Define MS_Word 2007. -Technology

Last Answer : MS-Word 2007 is a Word processing software package, which allows you to easily create a variety of professional looking documents like letters, reports and other documents using features such as Themes, Styles, SmartArt and more. It is a powerful tool chat you can use to create effective documents.

Description : How will you define an element in DTD contain plain text? -Technology

Last Answer : If an element should contain plain text, you define the element using #PCDATA. PCDATA stands for Parsed Character Data and is the way you specify non-markup text in your DTDs.

Description : Which document is used to define the style of an XML document? -Technology

Last Answer : CSS is a text document (or stylesheet) that is commonly used to define the style and layout of an XML document.

Description : Define prolog and data instance. -Technology

Last Answer : The prolog is a preface or introduction to XML document. It can contain upto five optional components. The grammar structure of the XML document is defined under prolog. The data instance consists of real data and its description through elements. It is also known as body of XML document.

Description : Define CSS. How to create a CSS file? -Technology

Last Answer : CSS is a simple design language intended to simplify the process of making Web pages presentable. CSS is a type of stylesheet and this stylesheet consists of a list of rules. You can include a CSS in multiple XML ... name as well as by code like green color may be written as #008000 or rgb(0,128,0).

Description : Define the term Mail Merge. -Technology

Last Answer : Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes by linking a main (common) document to a set of data or data source. The main document is linked to the ... be the letter informing the person that they have won money, or their car service time has arrived.

Description : ……… is used to define the structure of an XML document. -Technology

Last Answer : DTDis used to define the structure of an XML document.

Description : ……… is a text document that is commonly used to define the style and layout of an XML document. -Technology

Last Answer : CSS is a text document that is commonly used to define the style andlayout of an XML document.

Description : XML is used to define other languages. -Technology

Last Answer : True XML is a meta-language, which is used to define other languages.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : Define the term workbook. -Technology

Last Answer : A workbook is a collection of worksheets. By default, there are three worksheets in every workbook.

Description : Define the meaning of formula. -Technology

Last Answer : Formula plays a major role in spreadsheet making. If we all needed to do is to put text and numbers in rows and columns, just about any Word processing program would fill the bill. Formula allows us to perform calculations using values from any cells to have the result appear in the formula cell.

Description : Define the term plagiarism. -Technology

Last Answer : Stealing someone else’s ideas or information and presenting them as your own is called plagiarism.

Description : Define staffing. -Technology

Last Answer : Staffing is the process of recruitment and selection of human resources for an organization.

Description : Define cell padding and cell spacing with respect to tables in HTML. -Technology

Last Answer : CELLSPACING controls the space between table cells and CELLPADDING sets the amount of space between the contents of the cell and the cell wall.

Description : Define container & empty tags in HTML -Technology

Last Answer : Container tags are tags which have both opening as well as closing tag like .....whereas empty tags are tags which have only opening tag like , .

Description : Define Shareware -Technology

Last Answer : Shareware is a proprietary software which is initially provided free of charges to users for a limited period on a trial basis, if the user decides to use it after the trial period he /she needs to pay for it.