FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The act or instance of making a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup.
A
cache memory
B
backup
C
copyright
D
encryption
Explanation: 

Detailed explanation-1: -The act or instance of making a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup. cache memory.

Detailed explanation-2: -A cache is a temporary data storage location that stores copies of frequently accessed data or files to provide faster access to software or hardware. Computers, mobile devices, web browsers, and other applications use cache to speed up data retrieval.

Detailed explanation-3: -A backup facility outfitted with computer systems that are ready to run is called a: cold site.

Detailed explanation-4: -Encryption is a process that renders data unreadable to anyone except those who have the appropriate password or key. By encrypting sensitive files (by using file passwords, for example), you can protect them from being read or used by those who are not entitled to do either.

Detailed explanation-5: -Definition: The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.

There is 1 question to complete.