Question
a.
modified
b.
accessed
c.
destroyed
d.
unauthorized access
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Destruction of files for malicious reasons such as access by fraudulent people is classified as being
Similar Questions
Discover Related MCQs
Q. In files, if order of operation on two or more files are similar, then operation will be
View solution
Q. Search in which record is checked and read for desired items in file linearly is classified as
View solution
Q. File code which engineers add to file name and limit access to few users is called
View solution
Q. Arrangement of data into a specific order is classified as
View solution
Q. Program packages that allows user to search items in a file or some combination of selected items are classified as
View solution
Q. Kind of exchange in which number is compared to next item for possible exchange is called
View solution
Q. Operations performed on serial file are in order would be much
View solution
Q. When data files are updated, new file is called
View solution
Q. Level of generations that are generally kept are
View solution
Q. Use of passwords and access codes to safeguard files is classified as
View solution
Q. Method of scanning of files for a desired record is classified as
View solution
Q. Process of creating copy of stored data onto another disc is termed as creating
View solution
Q. Program that allows users to find or search words from passage of text includes
View solution
Q. Two sequential files with ordered records are combined in single file is considered as
View solution
Q. Numbers are usually sorted into
View solution
Q. File before master file is classified as
View solution
Q. Interleaving of records to form one file containing all records is classified as
View solution
Q. In data sorting, searching, selecting and placing smallest size data is classified as
View solution
Q. Destruction of files by hardware failure such as scratches and dirt on disc is classified as being
View solution
Q. Dumping of files, creating backup files and keeping generation of files are methods of
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!