Which of the following is not a step involved in data conversion?

3 years ago

A. Input B. Output C. Process D. Transfer Correct Answer: Option D - Transfer

Password reset disk should be created?

3 years ago

A. every time the user changes the password. B. once only. C. only when the user forgets the password. D.…

A computer program that gathers information about a person or organization without their knowledge or consent is known as?

3 years ago

A. Adware. B. Time Bomb. C. Malware. D. Spyware. Correct Answer: Option C - Malware

Which of the file organization methods can be accessed both randomly and sequentially?

3 years ago

A. Direct files B. Indexed sequential files C. Random files D. Sequential files Correct Answer: Option B - Indexed sequential…

Effects of file insecurity include the following except?

3 years ago

A. virus infection. B. file corruption. C. encrypted data D. data loss. Correct Answer: Option C - encrypted data

The following actions are sources of breaches in computing except?

3 years ago

A. carelessness B. hackers' threat. C. piracy. D. viruses. Correct Answer: Option A - carelessness

In BCD encoding system; 25; will be represented as?

3 years ago

A. 01100101 B. 01010110. C. 00100101. D. 0101001. Correct Answer: Option C - 00100101

A bit as used in computing in digital communication is?

3 years ago

A. a decimal digit. B. an octal digit. C. a bin digit. D. .a hexadecimal digit. Correct Answer: Option C…

Which of the options labeled I to IV give two stages involved in booting?

3 years ago

I. Power On self-test II. Loading of Operating System IIl. Loading of email IV. Power On Safe Mode   A.…

The disk operating system will label three hard drives as?

3 years ago

A. A, B and C. B. C, D and E. C. B, C and D D. F, G and H.…