answersLogoWhite

0

Charactors to prevent unauthorised access are called?

Updated: 8/21/2019
User Avatar

Wiki User

7y ago

Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Charactors to prevent unauthorised access are called?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is there a secret underground base in America called Area 51?

Area 51 is a nickname for a military base in the Nevada dessert. It has high security unauthorised access can result in you getting shot!


What is the process of modifying data thet doesnt allow unauthorised users from reading it?

It's called encryption.


What are software programs or hardware devices that are used to prevent unauthorized access to someone's computer called?

anti spyware


When an author gives information about a character through other charactors it is called what?

This is one form of indirect characterization.


What is the difference between heredity and maturation?

Hereditary is a particular growth sequence and for many kinds of behavior typical of the species continue to develop for many months. This process in which heredity continues to function after birth is called maturation.


What kind of program is Microsoft online access?

There is no program called Microsoft Online Access, but there is a program called Microsoft Access -- it is a database program.


Is cracking considered more dangerous than hacking because damage is caused?

ANY unauthorised access to another computer - is a criminal offense. The type of intrusion can range from simply locking the computer - to wiping out the whole hard drive. So-called 'hackers' never consider that the actions they do could ultimately kill someone ! They just think it's funny that they're causing mayhem !


What is the simplest type of filter in access?

In access is called "Filter By Selection"


What are viruses that prevent bacteria?

Viruses that prevent bacterial infections are called as "bacteriophages".


Access displays tabs called when you perform certain taks?

Access displays tabs, called _____, when you perform certain tasks.


What is another word for using without permission?

That actually depends upon what it is that you are using. If you use someone's car without permission, that is called stealing. If you use someone's movie without permission, that is called piracy. If you use someone's body without permission, that is called rape.


Access points or junctions to the internet backbone are called?

Network Access Points