COMPUTER STUDIES QUESTIONS WITH ANSWERS
Describe the following terms with reference to security of data:Â Log files and Firewalls29/12/2020 Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) A student’ database comprises of students’ details table and fees received table as shown below:
Students’ details table
​i) State the primary key field for each table.
ii) State the field, which should serve as the linking field for the two tables. c) Describe the following terms with respect to computer security: i) Logic bombs ii) Physical security iii) Tapping d) List three functions of antivirus software.
(i) Log files
(i)State the primary key field for each table.
c) Describe the following terms with respect to computer security: i)Logic bombs A computer virus that is activated after a series of event/commands/date ii) Physical security Threats that threaten the physical nature of computer equipment e.g. Fire, Lightening water, building access etc iii) Tapping.
​​Related Searches on Data Security and Controls, Database, Form 2 Level
0 Comments
Leave a Reply. |
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|