Answer:
1. B
2. D
3. C
4. A
5. B
Explanation:
1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."
2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.
3. Virus is a software program that can infect, damage and disrupts the whole computer system.
4. To protect the whole computer system, the software utility which is needed is an Anti-virus.
5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.
Answer:
Number of strings = (10, 2)×(8,3) = 2520
Explanation:
The number of possible combinations for taking two 0's is C(10, 2)
It remains 8 Positions
The number of possible combinations for taking three 1's is C(8,3)
So there remains 5 spots
Answer:
C) have more security vulnerabilities than software
Explanation:
Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.
However, some of the characteristics of Hardware VPN is the following:
1. It is expensive compared to software VPN
2. It is generally faster
3. It requires more than a beginner to handle
4. With an in-built firewall, it is generally more secure compared to a software VPN.
Hence, in this case, the correct answer is option C.
There are some function which can be performed with database but not with a spread sheet, these functions include:
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.