A computer program that gathers information about a person or organization without their knowledge or consent is known known as

3 years ago

A. adware B. time bomb C. trojan horse D. spyware Correct Answer: Option C = trojan horse

Which of the following options is not a similarity between computer file and manual file? Both can

3 years ago

A. be accessed B. be retrieved C. store multimedia D. contain information Correct Answer: Option C - store multimedia

The file access method shown in Figure 12 is called?

3 years ago

A. hashed access B. indexed access C. random access D. sequential access Correct Answer: Option A - hashed access

To prevent unforeseen data loss; a user must?

3 years ago

A. edit the data B. create the data C. backup the data D. defragment the data Correct Answer: Option C…

The binary number 0.1101 in decimal is?

3 years ago

A. 0.8125 B. 0.8215 C. 0.8225 D. 0.8512 Correct Answer: Option C = 0.8225

A single character in an EBCDIC encoding system can be represented using?

3 years ago

A. 4 bits B. 6 bits C. 8 bits D. 16 bits Correct Answer: Option C - 8 bits

The part of the computer system shown in Figure 11 is used to?

3 years ago

A. perform memory test B. power on or off the computer C. print a document from the computer D. reset…

Changing the default settings or appearance of the Taskbar in windows by a user is known as?

3 years ago

A. customization B. designing C. generalization D. globalization Correct Answer: Option A - customization

The windows shortcut key for closing an active application is?

3 years ago

A. Alt+F4 B. Ctrl+Alt+Del C. Ctrl+Esc. D. Ctrl+Shift+Del Correct Answer: Option A - Alt+F4

The screen background where icons and windows are displayed is GUI is called?

3 years ago

A. explorer B. desktop C. opening screen D. homepage Correct Answer: Option D - homepage