| A | | B | | C | | D | | E | | F | | G | | H | | I | | J | | K | | L | | M | | N | | O | | P | | Q | | R | | S | | T | | U | | V | | W | | Y | | Z |

Definition of "Weak access control"

Security software that provides log-on procedures is available for PCs. Most of these programs, however, become active only when the computer is booted from the hard drive. Disc locks are devices that prevent unauthorized individuals from accessing the floppy disk or pen drive of a computer.

| A | | B | | C | | D | | E | | F | | G | | H | | I | | J | | K | | L | | M | | N | | O | | P | | Q | | R | | S | | T | | U | | V | | W | | Y | | Z |

Videos
Books
Notes
Loading
Refer Your Friends
How to refer?

1 Click link below to share on facebook

OR

2 Enter your friends email address and invite them to join cakart (comma seperated)

Buy India's Best CA, CS, CMA Faculty Video Classes only at CAKART
SIGN UP
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.