_________computer are of large size?
_________computer are of large size?
A. Micro
B. Mainframe
C. Super
D. Mini
_________computer are of large size? Read More »
Computer Mcqs_________computer are of large size?
A. Micro
B. Mainframe
C. Super
D. Mini
_________computer are of large size? Read More »
Computer Mcqs____________computer is a medium sized computer?
A. Micro
B. Mainframe
C. Super
D. Mini
____________computer is a medium sized computer? Read More »
Computer McqsCathode Ray Tube is a form of__________?
A. Keyboard
B. Mouse
C. Monitor
D. Mother board
The cathode ray tube (CRT) is a vacuum tube that contains one or more electron guns and a phosphorescent screen, and is used to display images.
Cathode Ray Tube is a form of__________? Read More »
Computer Mcqs____________computer is small general purpose micro computer, but larger than portable computer?
A. Hybrid
B. Digital
C. Desktop
D. Laptop
The first electronic computer was developed by____________?
A. J.V. Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf
The first electronic computer was developed by____________? Read More »
Computer Mcqs___________refers to electronic trespassing or criminal hacking?
A. Cracking
B. Jacking
C. Spoofing
D. Smarming
___________refers to electronic trespassing or criminal hacking? Read More »
Computer Mcqs__________is defined as any crime completed through the use of computer technology?
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
__________is defined as any crime completed through the use of computer technology? Read More »
Computer McqsTo prevent the loss of data during power failures, use a(n)_____________?
A. Encryption program
B. Surge protector
C. Firewall
D. UPS
To prevent the loss of data during power failures, use a(n)_____________? Read More »
Computer McqsThe scrambling of code is known as___________?
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
The scrambling of code is known as___________? Read More »
Computer McqsHardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall