Answer:
Operating system
Explanation:
Operating system is a system software that manage all the software and hardware on a computer. It is the most important software in a computer. Operating system coordinates the entire communication process between software and hardware to ensure they work properly. It also manages the computer resources such as memory and storage spaces.
Some popular operating systems include Microsoft Windows, Mac OSX and Linux.
The answer is A. Dude it shows a input device. It’s basically a disc driver
Answer:
Cryptography
is the correct answer.
Explanation:
<h2><u>
Cryptography</u> offers a mechanism to accomplish four security goals.</h2><h2 />
Cryptography can be defined as technique to format data in such a way that it is Protected. It can be achieved by following goals:
- Confidentiality is a term that ensures that the data is protected in such a way that it can not be accessed by any unauthorized member. In simpler words any kind of sensitive data is only under the access of people who have authorization key to retrieve or use it.
- Integrity ensures that the data is real and authenticated. It basically safeguards the actual data.
- Authentication is a process of verifying an identity by different means. Mostly it includes the the verification by username/password entrance
- Non-repudiation is basically an surety that the data can't be denied by anyone. Non-repudiation provides the proof that the data is from origin and integrated.
<h3>I hope it will help you!</h3>
Answer:
The International Centre for Integrated Mountain Development (ICIMOD) is a regional intergovernmental learning and knowledge sharing centre serving the eight regional member countries of the Hindu Kush Himalayas: Afghanistan, Bangladesh, Bhutan, China, India, Myanmar, Nepal, and Pakistan.
Answer:
iptables
Explanation:
On a Linux system, iptables command allows us to modify settings of the built-in packet filtering firewall.
Iptables is used to set up, maintain, inspect and update the tables of IP packet filtering rules on Linux.
For example,
- To view the current rule settings we can use the command:
# iptables -L -n -v
- To add new firewall rules:
# iptables -I INPUT <rule number> -s <source-ip address> -j DROP