Answer:
A table with sample values
A chart with sample values
Explanation:
A computer uses unallocated space also know as free space to keep a file that has been deleted in its disk until a new file takes it spot and overwrites it.
Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Answer:
spooler
Explanation:
A print server uses a print spooler as a software holding area for jobs waiting to be printed.
Answer:
Option C is the correct answer for the above question
Explanation:
Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.
The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--
- Option a states Credibility which is not the process to enter the system.
- Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
- Option d states Honesty which is not the process to enter the system.