Computer Science Basic MCQs

Q.  The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

a. robotics
b. simulation
c. computer forensic
d. animation


ANSWER: See Answer
 
No explanation is available for this question!
MCQs:  Which of the following is not a binary number?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following does not store data permanently?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following is the smallest storage?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following contains permanent data and gets updated during the processing of transactions?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following helps to protect floppy disks from data getting accidentally erased?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A modem is connected to
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Large transaction processing systems in automated organisations use
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  In a computer most processing takes place in
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following is not a storage medium?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The computer abbreviation KB usually means
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The typical computer criminal is a
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The common name for the crime of stealing passwords is;
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Collecting personal information and effectively posing as another individual is known as the crime of:
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Malicious software is known as:
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A program that performs a useful task while simultaneously allowing destructive acts is a:
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  In 1999, the Melissa virus was a widely publicised:
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  What type of virus uses computer hosts to reproduce itself?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The thing that eventually terminates a worm virus is a lack of:
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  When a logic bomb is activated by a time-related event, it is known as a:
Category: Computer Science MCQs,   Published by: T-Code Scripts