Answer:
Wikipedia
Explanation:
Most people go to other websites because they don't like to read the articles, they just want the information now, but Wikipedia has some of the most detailed articles on information to do with anything, and it's free to use.
Answer:
Interruption attack are also referred to as Denial Of Service(DOS) attack.
Explanation:
Interruption attack are also called denial of service.The main aim of interruption attack or Denial Of Srvice attack is to make resources unavailable.
For example:- wordpress.com had an DOS attack that took down their servers hence the service was unavailable for it's users.
Hence we conclude that the answer to this question is Denail of Service (DOS).
Answer:B
Explanation:Showing parts of a whole.
Answer:
The operating system must by the use of policies define access to and the use of all computer resources.
Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.
Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:
- General Policies
- Server Policies
- VPN Policies
- Back-Up Policies
- Firewall Access and Configuration Policies
Cheers!
Answer:
input Devices, Processing Devices, Output Devices, Memory/Storage Devices
Explanation: