Boot strap or vector is called
A. | grappling hook program |
B. | main program |
C. | secondary program |
D. | primary storage |
Option: A Explanation : Click on Discuss to view users comments. |
The most common approach to authenticating a user identity is
A. | user passwords |
B. | user log in |
C. | hardware device |
D. | none of these |
Option: A Explanation : Click on Discuss to view users comments. |
Viruses
A. | another form of computer attack is virus |
B. | virus are designed to spread into other programs and can wreak havoc in a system |
C. | it modifying or destroying files and causing system crashes and program malfunctions |
D. | all of these |
Option: D Explanation : Click on Discuss to view users comments. |
In one time password
A. | the password is different in each instance |
B. | the password is same in each instance |
C. | both (a) and (b) |
D. | none of these |
Option: A Explanation : Click on Discuss to view users comments. |