Which of the following is considered as the world's first antivirus program?


In the RISC architecture, the _____ is updated whenever a function is called:


Making a system store data in memory contiguously would:


Which of the following are computer architectures different from conventional von Neumann architecture?


Which type of algorithms are applicable to scheduling resources in operating systems?


The time complexity of finding a shortest path in a network is:


Which of the following best describes 'insider threats'?


What is the primary objective of 'data backup and recovery' strategies?


Which of the following is a key benefit of 'endpoint encryption'?


What is the role of 'intrusion prevention systems' (IPS) in information security?