Login
Remember
Register
User GeorgeBell
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by GeorgeBell
0
votes
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
Which of the following is a good practice?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
Which of the following is least secure method of authentication ?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
Why is one time password safe ?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
What is characteristic of RADIUS system?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
Which of the following is considered as the unsolicited commercial email?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
Which one of the following can be considered as the class of computer threats?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
In which of the following, a person is constantly followed/chased by another person or group of several peoples?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
What is characteristics of Authorization ?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
From the following, which is not a common file permission?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
Which of the following are forms of malicious attack?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
What are the common security threats?
answered
Feb 6, 2022
in
Secure Programming Practices
user-authentication-interview-question
0
votes
Which of the following is a good practice?
answered
Feb 6, 2022
in
Usability Principles
user-authentication-interview-question
0
votes
Blockchain is a distributed______.
answered
Feb 6, 2022
in
Blockchain Intermedio
blockchain-intermedio-interview-question-answer
0
votes
How to Fit a sigmoidal curve to this oxy-Hb data?
answered
Jan 30, 2022
in
R Language
r-language
0
votes
How can i Fitting polynomial model to data in R?
answered
Jan 30, 2022
in
R Basics
r-language
0
votes
How to use nested if - else-if statement to change certain values in one column of dataframe based on criteria in another column?
answered
Jan 30, 2022
in
R Language
r-language
0
votes
How do I switch from Developer to DevOps?
answered
Jan 30, 2022
in
Data Science
data-science
0
votes
Are Excel skills in demand?
answered
Jan 30, 2022
in
Data Analytics
data-science
0
votes
How do I become an Azure DevOps expert?
answered
Jan 29, 2022
in
DevOps
devops
Page:
« prev
1
...
43
44
45
46
47
48
49
50
51
52
53
...
84
next »
...