Computer Science Basic MCQs

Q.  To move a copy of file from one computer to another over a communication channel is called?

a. File transfer
b. File encryption
c. File modification
d. File copying


ANSWER: See Answer
 
No explanation is available for this question!
MCQs:  Which of the following is NOT one of the four major data processing functions of a computer?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  All of the following are examples of storage devices EXCEPT :
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The CPU and memory are located on the :
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  is the science that attempts to produce machines that display the same type of intelligence that humans do
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Servers are computers that provide resources to other computers connected to a
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  When creating a computer program, the designs the structure of the program
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A computer program that converts an entire program into machine language at one time is called a/ an
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Computers process data into information by working exclusively with :
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The difference between people with access to computers and the Internet and those without this access is known as the :
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Computers manipulate data in many ways, and this manipulation is called.____________________
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Where does most data go first with in a computer memory hierarchy ?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The ________________data mining technique derives rules from real-world case examples.
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  are used to identify a user who returns to a website.
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Why is it unethical to share copyrighted files with your friends?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Reusable optical storage will typically have the acronym-
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The most common type of storage devices are-
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A device that connects to a network without the use of cables is said to be-
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-
Category: Computer Science MCQs,   Published by: T-Code Scripts