Get premium membership and access questions with answers, video lessons as well as revision papers.
a. At the point of switching on the computer – to restrict access to the computer.
b. On folders/directories – to restrict access to entire folders/directories.
c. On files – to restrict access to individual files within a directory.
d. On database systems – to restrict access to individual data elements.
francis1897 answered the question on March 15, 2023 at 06:42
- What are the precautions against unauthorized access?(Solved)
What are the precautions against unauthorized access?
Date posted: March 15, 2023. Answers (1)
- What are the harms caused by a computer criminal?(Solved)
What are the harms caused by a computer criminal?
Date posted: March 15, 2023. Answers (1)
- Give some of the precautions that can be taken against crashing of hard disks(Solved)
Give some of the precautions that can be taken against crashing of hard disks
Date posted: March 15, 2023. Answers (1)
- Describe crashing of hard disks as a cause of data loss in computers(Solved)
Describe crashing of hard disks as a cause of data loss in computers
Date posted: March 15, 2023. Answers (1)
- Discuss the precautions that can be taken against accidental erasure(Solved)
Discuss the precautions that can be taken against accidental erasure
Date posted: March 15, 2023. Answers (1)
- Describe computer viruses as a cause of data loss in computers and the precautions that should be taken(Solved)
Describe computer viruses as a cause of data loss in computers and the precautions that should be taken
Date posted: March 15, 2023. Answers (1)
- Describe power failure as a cause of data loss in computers(Solved)
Describe power failure as a cause of data loss in computers
Date posted: March 15, 2023. Answers (1)
- What are the main cause of power disruptions?(Solved)
What are the main cause of power disruptions?
Date posted: March 15, 2023. Answers (1)
- What are the precautions against data loss due to power failure?(Solved)
What are the precautions against data loss due to power failure?
Date posted: March 15, 2023. Answers (1)
- What are the environmental threats to computers and information systems and the security measures against them?(Solved)
What are the environmental threats to computers and information systems and the security measures against them?
Date posted: March 15, 2023. Answers (1)
- A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors...(Solved)
A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors and omissions. What do we secure in computers?
Date posted: March 15, 2023. Answers (1)
- What is computer security?(Solved)
What is computer security?
Date posted: March 15, 2023. Answers (1)
- What are rules that must be observed in order to keep within the law when working with data?(Solved)
What are rules that must be observed in order to keep within the law when working with data?
Date posted: March 15, 2023. Answers (1)
- What are log files?(Solved)
What are log files?
Date posted: March 15, 2023. Answers (1)
- With the aid of a diagram, describe data encryption(Solved)
With the aid of a diagram, describe data encryption
Date posted: March 15, 2023. Answers (1)
- Describe audit trails as a way of detection and protection against computer crimes(Solved)
Describe audit trails as a way of detection and protection against computer crimes
Date posted: March 15, 2023. Answers (1)
- State some of the ways of reducing piracy(Solved)
State some of the ways of reducing piracy
Date posted: March 14, 2023. Answers (1)
- What are the different ways tapping may take place?(Solved)
What are the different ways tapping may take place?
Date posted: March 14, 2023. Answers (1)
- Who is an hacker?(Solved)
Who is an hacker?
Date posted: March 14, 2023. Answers (1)
- Give the reasons for hacking(Solved)
Give the reasons for hacking
Date posted: March 14, 2023. Answers (1)