Main Menu
🛠️
Tools
❓
Questions
📝
Quiz
✍️
Test
🎯
GK
Useful Links
SEARCH
Account
More
Technology
Questions
Tags
Questions
Technology Questions & Answers
A(n) _ is created by an application.
Computer scientists are exploring the possibility of culturing bacteria to create living chips which have digital electronic properties. What are these chips called?
How many bits is a net worth?
It is a software program designed to record (‘log’) every keystroke on the machine on which it runs
ROM is needed for storing an initial program called _.
The device large in size and occupied a lot of space and produced enormous heat was _
The process of writing computer instructions in a programming language is known as
Use this when you want to make all letters capital without having to use the shift key for each character.
What is the Websites code for the country Mongolia?
Which one of the following terms is not associated with information technology?
A device for converting handwritten impressions into coded characters & positional coordinates for input to a computer is
A(n) _ is text that you want to be printed at the bottom of the pages.
Computer software can be defined as
How many fiber rings are used in the FDDI cabling ?
It is a tool used to quickly check computers on a network for known weaknesses.
ROM maintains data when _
The device operation at Data Link layer is
The process of writing computer instructions in a programminglanguage is known as _
Using output devices one can
What is the Websites code for the country New Zealand?
Which kind of devices allows the user to add components and capabilities to a computer system?
Which one of the following would be considered as a way that a computer virus can enter a computer system?
_ ‘are attempts by individuals to obtain confidential information from you by falsifying their identity.
A device invented by Dr. Bobeck in 1966, for mass storage of data is
A(n) ....... device is any device that provides information, which is sent to the CPU.
Computer Virus is a _.
How many generations, computer can be classified?
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
ROM tells the computer to-
The device primarily used to provide hardcopy is the
The process of writing out computer instructions is known as
Using the Recycle Bin gives you a chance to get back files that you have _ by mistake.
What is the Websites code for the country United Kingdom?
Which kind of storage device can be carried around?
_ a document means the file is transferred from another computer to your computer.
A device operating at the network layer is called a
A(n)_ Language reflects the way people think mathematically.
How many hosts are attached to each of the local area network at our site?
It is also called the brain of the computer, is responsible for processing data.
Rootkit is
The device that allow us to transfer pictures and photographs to our computer
The process that deals with the technical and management issues of software
Usually information security in a network is achieved by
What is the World Wide Web?
Which language was devised by Dr. Seymour Aubrey Papert?
Which of the following is not true of a magnetic disk?
_ acts as temporary high speed holding area between the memory and the CPU thereby improving processing capabilities.
A device operating at the physical layer is called
A(n).....camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
Computer’s BIOS stored in
« First
71
72
73
74
75
Last »
10
25
50