adplus-dvertising
frame-decoration

Question

Protecting computers and information they contain against unwanted access, damage, modification or destruction is called

a.

computer monitoring

b.

electronic policing

c.

audit control

d.

computer security

Posted under IT Fundamentals

Answer: (d).computer security

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Protecting computers and information they contain against unwanted access, damage, modification or destruction is called

Similar Questions

Discover Related MCQs

Q. Which of the following is not the way of ensuring that even if the hardware fails, you will still be able to access your data in computer?

Q. The most devastating loss to a company is

Q. Security protection for personal computers includes

Q. Secret words or numbers used for protection of devices is called

Q. All of the following are biometric techniques except

Q. Example of a good password is

Q. Most computer crimes are committed by

Q. Person who gains illegal access to a computer system is known as

Q. In a computer, McAfee is a/an

Q. Which of the following is harmful for computer?

Q. Computer virus is simply a

Q. Viruses which executes when computer starts is

Q. Special program which can detect and remove viruses from computer is called

Q. Example of computer anti virus program includes

Q. Program that interferes with the normal routine of the computer is called

Q. Which of the following is computer virus?

Q. Virus reaches from one computer to another by

Q. All of the given below are anti virus programs except

Q. Which of the following is not a cause of computer virus?

Q. Computer malicious program which is activated when a specific set of conditions is met is called