A. character, field, record, table, database, file B. character, field, record, table, file, database C. record, file, field, table, character,…
A. directory virus B. logic bomb C. polymorphic virus D. root kit virus Correct Answer: Option B - logic bomb
A. retrieves the listed fields from student table B. highlight the listed fields from student table C. hides the selected…
A. face-to-face interaction among staff may be reduced B. initial investment cost can be high C. running cost becomes lower…
A. designs flowchart B. designs and implements new solutions C. trains computer users D. writes complex computer programs Correct Answer:…
A. antivirus B. encryption C. firewall D. firmware Correct Answer: Option A - antivirus
A. arranging the chairs in the room together B. keeping liquid within the room C. closing the door always D.…
A. cyber crime B. packet sniffing C. phishing D. spamming Correct Answer: Option A - cyber crime
A. damaged driver B. dirty mouse ball C. improper connection of mouse cable D. outdated driver Correct Answer: Option A…
A. plugging of power supply cable B. spraying a windows cleaner on the monitor C. unplugging the power supply cable…