In your own view, what are some of the intentions of the people who may want to access data without permission?
Next: What are the control measures against computer viruses?Previous: Discuss the forms of unauthorized access View More Data Security and Control Questions and Answers | Return to Questions Index
State the types of destructions/damages caused by a virus attack
Date posted: March 14, 2023. Answers (1)
What are the two tasks a virus (computer code) is designed to undertake?