MCQs: When a computer is switched on, the booting process performs___________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Which of the following is not a binary number?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Which of the following does not store data permanently?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Which of the following is the smallest storage?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Which of the following contains permanent data and gets updated during the processing of transactions?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: A modem is connected to_____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Large transaction processing systems in automated organisations use___________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Which of the following is not a storage medium?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: The computer abbreviation KB usually means____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: The typical computer criminal is a(n)____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: The common name for the crime of stealing passwords is____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Malicious software is known as____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: In 1999, the Melissa virus was a widely publicised:____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: What type of virus uses computer hosts to reproduce itself?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: The thing that eventually terminates a worm virus is a lack of:
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: When a logic bomb is activated by a time-related event, it is known as a____________?
Category: Computer Science MCQs, Published by: teswesm
|