Answer:
The correct answer for the given question is option(A) i.e File History.
Explanation:
In computer system file history is an backup application which create backup of your data which are stored in your libraries, desktops, contacts, and favorites to another storage location .It creates back up of your data to another location when your personal files has been changed.
The user can check the file history option in computer system
open control panel >>system and security >> file system
Answer:
OLE DB Driver for SQL Server uses the term data source for the set of OLE DB interfaces used to establish a link to a data store, such as SQL Server. Creating an instance of the data source object of the provider is the first task of an OLE DB Driver for SQL Server consumer.
Explanation:
hope it helps you and give me a brainliest
<u>Extensible Markup Language (XML)</u> is a markup language designed to transport and store data on the Web.
Explanation:
- Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable
- Extensible means that the language is a shell, or skeleton that can be extended by anyone who wants to create additional ways to use XML.
- Markup means that XML's primary task is to give definition to text and symbols.
- It is a textual data format with strong support, Unicode for different human languages.
- Extensible Markup Language (XML) is used to describe data.
- The design goals of XML emphasize simplicity, generality, and usability across the Internet.
- It is a text-based markup language derived from Standard Generalized Markup Language (SGML).
Group of answer choices.
a. firewalls
b. access controls
c. proxy servers
d. All of the above
Answer:
d. All of the above
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.
A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.
Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device.
You can set up a web page where objects change where they, appear, disappear, move, morph using TIMELINE.
Explanation:
- A timeline is presentation of a sequence of events along a drawn line that enables the reader to quickly understand relationships relating to or limited by time.
- A website project timeline should list the most important milestones that represent the major stages of creating the website.
- A timeline can also be used in a web page to change objects within.
- Morphing involves automatically matching the basic look and feel of a website to cognitive styles.
- Each stage should be given a set length of time that corresponds to its size and complexity. There is a set of objectives that need to be accomplished in order to complete each stage which help the web page become a reality.
- Effects can make an object appear, disappear, morph or move. They can change an object's size or color