| A | | B | | C | | D | | E | | F | | G | | H | | I | | J | | K | | L | | M | | N | | O | | P | | Q | | R | | S | | T | | U | | V | | W | | Y | | Z |

Definition of "Weak access control"

Security software that provides log-on procedures is available for PCs. Most of these programs, however, become active only when the computer is booted from the hard drive. Disc locks are devices that prevent unauthorized individuals from accessing the floppy disk or pen drive of a computer.

| A | | B | | C | | D | | E | | F | | G | | H | | I | | J | | K | | L | | M | | N | | O | | P | | Q | | R | | S | | T | | U | | V | | W | | Y | | Z |

Loading
Refer Your Friends
How to refer?

1 Click link below to share on facebook

OR

2 Enter your friends email address and invite them to join cakart (comma seperated)

Buy India's Best CA, CS, CMA Faculty Video Classes only at CAKART
Set up a call back request
Let us call you back

Any Question on video classes & books for your exam?

Set up a call back request