The Use of electronic systems to send an unsolicited e-mail to someone’s address is known as ______

3 years ago

A. Hacking B. Spamming C. Internet fraud D. Piracy Correct Answer: Option A = Hacking

An advantage of sequential access over serial access is that ______?

3 years ago

A. Sequential file is slow B. Sequential file is detailed C. Sequential file does not use key D. Individual records…

Which of the following statements is not true about a computer file?

3 years ago

A. It is very fast to access any record within a file B. It is created electronically C. Initial setup…

The transaction file can also be described as _______?

3 years ago

A. Master File B. Movement file C. Reference file D. Historical file Correct Answer: Option B - Movement file

The conversion of 11001 2 to base 10 equals _______

3 years ago

A. 30 B. 28 C. 25 D. 20 Correct Answer: Option C = 25

In hexadecimal number system, B, D, E represent_________

3 years ago

A. 11, 12, 13 respectively B. 12, 14, 15 respectively C. 13, 14, 15 respectively D. 14, 16, 17 respectively…

The process of restarting a computer is known as ________?

3 years ago

A. Cold booting B. Warm booting C. Resume booting D. Restart booting Correct Answer: Option B - Warm booting

The Instruction fetched into the CPU is decoded by the __________?

3 years ago

A. Primary memory B. Program counter C. ALU D. Control unit Correct Answer: Option D = Control unit

Which of the following statements is true about registers?

3 years ago

A. It is a storage area around CPU B. It is situated beside the CPU C. It is situated beside…

In changing the storage location of a file; the command to use is ______?

3 years ago

A. ctrl + S keys B. 'save' command C. 'save as' command D. alt + F, then save Correct Answer:…