answersLogoWhite

0

encryption

only windows with built in encryption software is win 7 ultimate

User Avatar

Wiki User

∙ 15y ago

What else can I help you with?

Related Questions

What are acess right?

Access right is set for a folder or a partition or even a drive in the computer so we can control on who can access or modify data in that particular folder or drive. This is very much important if your computer is connected to a network so that you can control who can view or modify the data in your computer remotely.


How has computer security evolved into modern information security in pdf?

Computer security in the earlier days was concerned primarily with controlling access to the computer system itself. In today's modern era data is a commodity that everyone wants, so confidentiality is a way to control access to information. Information security has to control who has access to data, and this is not just via the computer or the network. So to answer the question, it started with computer access and evolved to ways of protecting confidential data that may be retrieved or accessed anywhere, not just via the computer.


In terms of computer security what is the security access control needed for?

Security access control limits what a user can see, use or access within a network. This is important because it restricts the ability to access data to those who are authorized to work with it.


Before a computer can process data where must data be stored?

I'm guessing RAM Random access memory


Why do ram access data?

a section of ram where the computer stores copied data


What does PC Remote Access software allow one to do?

Remote PC software is used to access a computer using a different computer. One can then control the other computer without being in the same room as that computer.


What is network terminal?

A computer that is used to access data on a network


Why is it important to control access to hardware and data?

It is important to control access to hardware and data to limit the amount of information that any one employee might have. It is also a good idea to control hardware and data to make sure confidentiality is being protected.


What has the author Allen C Benson written?

Allen C. Benson has written: 'Securing PCs and data in libraries and schools' -- subject(s): Computer security, Microcomputers, Access control, Data protection


Definition of control memory in computer system architecture?

Control memory is a random access memory (RAM) consisting of addressable storage registers. It is primarily used in mini and mainframe computers. It is used as a temporary storage for data. Access to control memory data requires less time than to main memory; this speeds up CPU operation by reducing the number of memory references for data storage and retrieval. Access is performed as part of a control section sequence while the master clock oscillator is running.


What is computer circuitry that temporarily holds data waiting to processed known as?

The Ram - Random Access Memory temporarily holds programs and data while the computer is on and allows the computer to access that information randomly.


Where default access database store?

the data which alerady stored in the memory of the computer and can not be change is know as default access data base store