Answer:
Software refers to the programs that run on your computer.
Explanation:
Examples are Word and PowerPoint. Computer programs contain instructions that the hardware carries out. ... Another program (called a compiler or interpreter) translates these instructions into machine language which the computer hardware understands.
Answer:
Data modeling occurs at three levels—physical, logical, and conceptual.
- A physical model is a schema or framework for how data is physically stored in a database.
- A conceptual model identifies the high-level, user view of data.
- A logical data model sits between the physical and conceptual levels and allows for the logical representation of data to be separate from its physical storage.
Answer:
All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.
Explanation:
View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.
Answer:
1) The VPN Client
2) VPN Server
Explanation:
The first VPN solution includes following elements.
1) The VPN Client: In our solution we required a VPN client.
2) VPN Server: The server of VPN includes following elements:
a) IP addressing
b) Tunnel and authentication
c) Remote access policy
d) Filtering
3) The software and hardware includes:
a) VPN enabled optamized router
b) VPN enabled firewall
So, according to first VPN solution we required vpn client as well as the vpn server.
The second solution include the vpn client as well as the vpn server. Here vpn client as well as the vpn
server having very limited functionality.
Answer:
The correct answer to the following question will be "Buffer overflow".
Explanation:
- For security policy and computing, the buffer overflow is a phenomenon where the code overwrites the boundaries of the buffer when adding data to the buffer and overwrites neighboring storage positions.
- A vulnerability of buffer overflow occurs when you offer so much data to a program. Excessive data corrupts memory space in the vicinity and it may change certain data. As a consequence, the program could report a mistake or act differently. These vulnerabilities are often referred to as buffer overrun.
- If the programmer constructs a compiled code which does not test for a given quantity of system memory, the buffer overflow would strike on it.
Therefore, Buffer overflow is the right answer.