What computer virus holds the record for being the most widespread computer virus? A. I Love You B. Nimdad C. Melissa D. Christmas Correct answer is: A. I Love You … What computer virus holds the record for being the most widespread computer virus?Read More »
What do you call the translator which takes assembly language program as input & produce machine language code as output? A. Compiler B. Interpreter C. Debugger D. Assembler Correct answer is: D. Assembler … What do you call the translator which takes assembly language program as input & produce machine language code as output?Read More »
Which of the following software could assist someone who cannot use their hands for computer input? A. Video conferencing B. Speech recognition C. Audio digitizer D. Synthesizer Correct answer is: B. Speech recognition … Which of the following software could assist someone who cannot use their hands for computer input?Read More »
Which of these is a point and draw device? A. Mouse B. Scanner C. Printer D. CD-ROM Correct answer is: A. Mouse … Which of these is a point and draw device?Read More »
The CPU comprises of Control, Memory and units? A. Microprocessor B. Arithmetic/Log ic C. Output D. ROM Correct answer is: B. Arithmetic/Log ic … The CPU comprises of Control, Memory and units?Read More »
_____________are set of rules and procedures to control the data transmission over the internet? A. IP address B. Domains C. Protocol D. Gateway Correct answer is: C. Protocol … _____________are set of rules and procedures to control the data transmission over the internet?Read More »
____________computer is a medium sized computer? A. Micro B. Mainframe C. Super D. Mini Correct answer is: D. Mini … ____________computer is a medium sized computer?Read More »
What is the most common tool used to restrict access to a computer system? A. User logins B. Passwords C. Computer keys D. Accesscontrol software Correct answer is: B. Passwords … What is the most common tool used to restrict access to a computer system?Read More »
Collecting personal information and effectively posing as another individual is known as the crime of ? A. Spooling. B. Identity theft. C. Spoofing. D. Hacking. Correct answer is: B. Identity theft. … Collecting personal information and effectively posing as another individual is known as the crime of ?Read More »
Which of the following is not a binary number? A. 001 B. 101 C. 202 D. 110 Correct answer is: C. 202 … Which of the following is not a binary number?Read More »