A. adware B. time bomb C. trojan horse D. spyware Correct Answer: Option C = trojan horse
A. be accessed B. be retrieved C. store multimedia D. contain information Correct Answer: Option C - store multimedia
A. hashed access B. indexed access C. random access D. sequential access Correct Answer: Option A - hashed access
A. edit the data B. create the data C. backup the data D. defragment the data Correct Answer: Option C…
A. 0.8125 B. 0.8215 C. 0.8225 D. 0.8512 Correct Answer: Option C = 0.8225
A. 4 bits B. 6 bits C. 8 bits D. 16 bits Correct Answer: Option C - 8 bits
A. perform memory test B. power on or off the computer C. print a document from the computer D. reset…
A. customization B. designing C. generalization D. globalization Correct Answer: Option A - customization
A. Alt+F4 B. Ctrl+Alt+Del C. Ctrl+Esc. D. Ctrl+Shift+Del Correct Answer: Option A - Alt+F4
A. explorer B. desktop C. opening screen D. homepage Correct Answer: Option D - homepage