Most frequently takled
Completely removes the file from the computer, which is useful if you don’t want it anymore. As with any deleted file, a file that your antivirus program deletes is no longer visible and can’t be used.
What is Clean a file ?
Removes the infection from the file but does not actually delete the file itself. This is the best option if you need to keep the file.
Software is not often operating system based.Ii does not need user interaction for functioning.
What is Application ?
Application is operation system based.Application need user interaction for functioning.
A single instruction that expands automatically into a set of instructions to perform a particular task
What is Code ?
A language understood by the computer. Coding makes it possible to create computer software
Broadband is a high-capacity high-speed Data transmission medium.Broadband technology can be used to transmit voice, data and video over long distances simultaneously.
What is router ?
Routers capture the information that come through broadband connection via a modem and deliver it to your computer. Routers are multiport devices and more sophisticated as compared to repeaters and bridges.
Broadcasting in Networking
In networking, a broadcast means that we send something that everyone receives, whether they need/want it or not.
What is Broadcast Domain ?
Broadcast domain is a collection of eligible (Logical ) network devices that receive broadcast traffic from each other.
What is Network Switch ?
A network switch (Hardware device ) operates on the network layer and channelise incoming data from multiple input ports to a specific output port.
What is Network bridge ?
Network device (Software ) whcih work on data link layer to interconnect two LANs together and separate network segments.
What is hardware router ?
Wired routers or non wired routers are physical hardware for receiving internet data
What is virtual router ?
Virtual router is a software-based routing framework that allows the host machine to perform as a typical hardware router over a local area network.
What is positive trigger in logic bomb ?
Logic bomb is triggred on specific date and time or the removal of an employee’s name from the salary database
What is negative trigger, in logic bomb ?
Logic bomb is triggred in condition such as a particular employee failing to input a command by a certain time
Artificial Intelligence is not a system,but is implemented in the system.It is the broad discipline of creating intelligent machines
The precautions taken to guard against crime that involves the Internet, especially unauthorized access to computer systems and data connected to the Internet. Cyber security is all about protecting data in its electronic form.
IT Security, is the process of implementing measures and systems designed to securely protect and safeguard information utilizing various forms of technology. IT security is considered a bit broader than cyber security.
The Internet of Things (IoT) is a system of physical things embedded with sensors, software, electronics and connectivity to allow it to perform better by exchanging information with other connected devices
A computer trapdoor, also known as a back door, provides a secret or at least undocumented method of gaining access to an application, operating system or online service.
3G is a collection of third generation cellular data technologies. In order to be labeled “3G,” a cellular data transfer standard must meet a set of specifications defined by the International Telecommunications Union, known as IMT-2000.
4G is a collection of fourth generation cellular data technologies. It succeeds 3G and is also called “IMT-Advanced,” or “International Mobile Telecommunications Advanced.” It became available in the United States in 2009, with Sprint being the first carrier to offer a 4G cellular network.
Alexa is Amazon’s Voice Service, accessed through Amazon Echo. After the set up process, you simply say the word ‘Alexa’ and Echo will light up and Alexa will respond
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.
RFID stands for “Radio-Frequency Identification.” RFID is a system used to track objects, people, or animals using tags that respond to radio waves.
What is Intrusion ?
An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm
What is Sand Box ?
A sandbox is a tightly controlled environment where programs can be run. Sandboxes restrict what a piece of code can do, giving it just as many permissions as it needs without adding additional permissions that could be abused.
What is meant by IDS ?
An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations.
what is computer virus ?
A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. … It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
What is Computer ?
A computer is a machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware program. It is designed to execute applications and provides a variety of solutions by combining integrated hardware and software components.
Basic components of Computer
The five units (The functional units) correspond to the five basic operations performed by all computer systems and are integral parts of a computer.
Input Unit, Output Unit, Storage Unit, Central Processing Unit (CPU), Arithmetic and Logic Unit (ALU)
What is software ?
Software is a set of instructions or programs instructing a computer to do specific tasks.
What is data mining ?
Data mining is the process of looking at large banks of information to generate new information”