UseFull Links
About
Accessbility
Help
Privacy & Terms
Financier
Budgeter
Calculator
Spreadsheet
A program to design to destroy data on your computer which can travel to infect other computer is called a _.
A protocol is a set of rules governing a time sequence of events that must take place
A proxy server is used for which of the following ?
A register that keeps track of the next instruction to be executed is called a/an
A regular TV set can be hooked up to a computer so as to received computer signal instead of a television program. This hooking up is achieved with the help of a
A remote batch-processing I operation in which data is solely input to a central computer would require
A removable magnetic disc that holds information
A report generator is used to
A result of a computer virus can not lead to ......
A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system is using