Symptoms of computer virus attack include:

3 years ago

I. improved processing speeds; Il. drive light coming up without a parent reason; Ill. unexplainable printer activity; IV. the disappearance…

The illegal copying and use of proprietary/copy righted software is called?

3 years ago

A. hacking B. spamming C. hardware piracy D. software piracy. Correct Answer: Option D - software piracy.

Sorting of records is sufficient and a necessary condition for creating?

3 years ago

A. random file B. indirect file C. sequential file D. indexed sequential file. Correct Answer: Option C - sequential file

Which of the following is a temporary file that can be used only once and then discarded?

3 years ago

A. Refresh file B. Master file C. System file D. Transaction file Correct Answer: Option D - Transaction file

Which of the following is true of a digital logic gate?

3 years ago

A. It has at least two inputs but only one output. B. It has many outputs and inputs. C. It…

The decimal number 1024 in hexadecimal equivalent is?

3 years ago

A. 24 B. 400 C. 3E8 D. 8BB Correct Answer: Option A - 24

The word bit refers to?

3 years ago

A. the value zero or one B. the value zero of more C. central processing unit command D. central processing…

The main advantage of intellectual property right is?

3 years ago

A. maximization of profit B. discovering of brilliant persons C. discovering of sharing D. encouragement of innovations. Correct Answer: Option…

Which of the following is not a biometric data?

3 years ago

A. finger prints B. password C. pattern of eye iris D. sound of the voice. Correct Answer: Option B -…

The initial screen that is displayed after a computer booting is referred to as?

3 years ago

A. desktop B. interface C. software D. taskbar Correct Answer: Option A - desktop