Sunday

The best arrangement that gives the correct order of magnitude of the database element is?

A. character, field, record, table, database, file B. character, field, record, table, file, database C. record, file, field, table, character,…

3 years ago

The malware which is programmed to initiate at a specific date or when a specific event occurs is called

A. directory virus B. logic bomb C. polymorphic virus D. root kit virus Correct Answer: Option B - logic bomb

3 years ago

The function of the SQL statement SELECT Student ID; Surname; House Name FROM Student, is that it

A. retrieves the listed fields from student table B. highlight the listed fields from student table C. hides the selected…

3 years ago

One advantage of information processing is that?

A. face-to-face interaction among staff may be reduced B. initial investment cost can be high C. running cost becomes lower…

3 years ago

A system analyst is a person who?

A. designs flowchart B. designs and implements new solutions C. trains computer users D. writes complex computer programs Correct Answer:…

3 years ago

Security breaches in computing cannot be prevented through the use of?

A. antivirus B. encryption C. firewall D. firmware Correct Answer: Option A - antivirus

3 years ago

One safety measure to consider in a computer room is?

A. arranging the chairs in the room together B. keeping liquid within the room C. closing the door always D.…

3 years ago

The use of the internet to perform illegal activities is generally called?

A. cyber crime B. packet sniffing C. phishing D. spamming Correct Answer: Option A - cyber crime

3 years ago

The erratic movement of the mouse pointer is usually caused by?

A. damaged driver B. dirty mouse ball C. improper connection of mouse cable D. outdated driver Correct Answer: Option A…

3 years ago

One precautionary measure taken when cleaning a monitor is?

A. plugging of power supply cable B. spraying a windows cleaner on the monitor C. unplugging the power supply cable…

3 years ago