Q1: The protection of all hardware components used in computer system.
Ans: Hardware Security
Q2: The measure of the amount of data that can be transmitted through a connection over a given amount of time.
Q3: A disk tool which helps to fix errors in the disk and also removes lost clusters, bad sectors.
Q4: The computerized mail service that answers telephone calls and record the audio message.
Q5: The design specification for how the nodes on a network interact and communicate.
Ans: Network Model