To move a copy of file from one computer to another over a communication channel is called? A. File transfer B. File encryption C. File modification D. File copying Correct answer is: A. File transfer … To move a copy of file from one computer to another over a communication channel is called?Read More »
provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously? A. Multitasking B. Multithreading C. Multiprocessin g D. Multicomputin g Correct answer is: A. Multitasking … provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously?Read More »
All of the following are examples of real security and privacy risks EXCEPT ? A. hackers B. Spam C. Viruses D. identity theft Correct answer is: B. Spam … All of the following are examples of real security and privacy risks EXCEPT ?Read More »
Where does most data go first with in a computer memory hierarchy ? A. RAM B. ROM C. BIOS D. CACHE Correct answer is: A. RAM … Where does most data go first with in a computer memory hierarchy ?Read More »
A DVD is an example of a (n) ? A. hard disk B. optical disc C. output device D. solid-state storage device Correct answer is: B. optical disc … A DVD is an example of a (n) ?Read More »
Which of the following contains permanent data and gets updated during the processing of transactions? A. Operating System File B. Transaction file C. Software File D. Master file Correct answer is: D. Master file … Which of the following contains permanent data and gets updated during the processing of transactions?Read More »
Who invented Java programming language ? A. Deniss B. Linus C. James D. Bajarnae Correct answer is: C. James … Who invented Java programming language ?Read More »
If a computer has more than one processor then it is known as ? A. Uni-process B. Multiprocessor C. Multi- threaded D. Multi- programming Correct answer is: B. Multiprocessor … If a computer has more than one processor then it is known as ?Read More »
Which Operation can’t be performed by Queue? A. Insertion B. Deletion C. Retrieving D. Traversing Correct answer is: D. Traversing … Which Operation can’t be performed by Queue?Read More »
Vendor-created program modifications are called ? A. patches B. fixes C. antiviruses D. holes Correct answer is: A. patches … Vendor-created program modifications are called ?Read More »