Which of the following is non-available memory? A. RAM B. Register C. DRAM D. PROM Correct answer is: B. Register … Which of the following is non-available memory?Read More »
Computers process data into information by working exclusively with ? A. multimedia B. word C. numbers D. characters Correct answer is: C. numbers … Computers process data into information by working exclusively with ?Read More »
Which language does MS-Word use to create Macros? A. Visual C++ B. Visual Java C. Visual Basic D. None of the Correct answer is: C. Visual Basic … Which language does MS-Word use to create Macros?Read More »
A device that connects to a network without the use of cables is said to be ? A. Distributed B. free C. centralized D. none of these Correct answer is: D. none of these … A device that connects to a network without the use of cables is said to be ?Read More »
Which shortcut key is used for calculating current sheet in Ms Excel? A. Ctrl+F9 B. Shift+F9 C. F9 D. F7 Correct answer is: B. Shift+F9 … Which shortcut key is used for calculating current sheet in Ms Excel?Read More »
Which of the following is not a binary number? A. 001 B. 101 C. 202 D. 110 Correct answer is: C. 202 … Which of the following is not a binary number?Read More »
Website is a . A. Data B. Address C. Search D. None Correct answer is: B. Address … Website is a .Read More »
Collecting personal information and effectively posing as another individual is known as the crime of ? A. Spooling. B. Identity theft. C. Spoofing. D. Hacking. Correct answer is: B. Identity theft. … Collecting personal information and effectively posing as another individual is known as the crime of ?Read More »
Which of the following is machine independence program? A. High level B. Low level C. Assembly D. Machine Correct answer is: A. High level … Which of the following is machine independence program?Read More »
What is the most common tool used to restrict access to a computer system? A. User logins B. Passwords C. Computer keys D. Accesscontrol software Correct answer is: B. Passwords … What is the most common tool used to restrict access to a computer system?Read More »