adplus-dvertising
frame-decoration

Question

Destruction of files for malicious reasons such as access by fraudulent people is classified as being

a.

modified

b.

accessed

c.

destroyed

d.

unauthorized access

Posted under IT Fundamentals

Answer: (a).modified

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Destruction of files for malicious reasons such as access by fraudulent people is classified as being

Similar Questions

Discover Related MCQs

Q. In files, if order of operation on two or more files are similar, then operation will be

Q. Search in which record is checked and read for desired items in file linearly is classified as

Q. File code which engineers add to file name and limit access to few users is called

Q. Arrangement of data into a specific order is classified as

Q. Program packages that allows user to search items in a file or some combination of selected items are classified as

Q. Kind of exchange in which number is compared to next item for possible exchange is called

Q. Operations performed on serial file are in order would be much

Q. When data files are updated, new file is called

Q. Level of generations that are generally kept are

Q. Use of passwords and access codes to safeguard files is classified as

Q. Method of scanning of files for a desired record is classified as

Q. Process of creating copy of stored data onto another disc is termed as creating

Q. Program that allows users to find or search words from passage of text includes

Q. Two sequential files with ordered records are combined in single file is considered as

Q. Numbers are usually sorted into

Q. File before master file is classified as

Q. Interleaving of records to form one file containing all records is classified as

Q. In data sorting, searching, selecting and placing smallest size data is classified as

Q. Destruction of files by hardware failure such as scratches and dirt on disc is classified as being

Q. Dumping of files, creating backup files and keeping generation of files are methods of