Describe the following terms with reference to security of data:Â Log files and Firewalls29/12/2020 Distinguish between the following sets of terms as used in spreadsheets. Worksheet and workbook, Filtering and sorting
b) A student’ database comprises of students’ details table and fees received table as shown below:
Students’ details table
​i) State the primary key field for each table.
ii) State the field, which should serve as the linking field for the two tables. c) Describe the following terms with respect to computer security: i) Logic bombs ii) Physical security iii) Tapping d) List three functions of antivirus software.
(i) Log files
(i)State the primary key field for each table.
c) Describe the following terms with respect to computer security: i)Logic bombs A computer virus that is activated after a series of event/commands/date ii) Physical security Threats that threaten the physical nature of computer equipment e.g. Fire, Lightening water, building access etc iii) Tapping.
​​Related Searches on Data Security and Controls, Database, Form 2 LevelFollow AtikaSchool.Org on our Social ChannelsThis gives you an opportunity to get our latest uodates, changes and firsthand information
0 Comments
Leave a Reply. |
Categories
All
Archives
December 2024
|