Computer Basic Information An intentionally disruptive program that spreads from program to program or from disk to disk is known as Time related bomb sequence Time bomb Virus Trojan horse Time related bomb sequence Time bomb Virus Trojan horse ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What is the storage capacity of a Hollerith card which is organized into nibbles? 32 128 64 None of these 240 32 128 64 None of these 240 ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information If, in a computer, 16 bits are used to specify addresses in a RAM, the number of addresses will be None of these 64K 65536 216 Any of the above None of these 64K 65536 216 Any of the above ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information __________ is the measurement of things such as fingerprints and retinal scans used for security access. Biometrics Computer security Biomeasurement Smart weapon machinery Biometrics Computer security Biomeasurement Smart weapon machinery ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Any method for controlling access to or use of memory is known as Memory instruction Memory management Memory map Memory protection None of these Memory instruction Memory management Memory map Memory protection None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A file containing relatively permanent data is None of these Random file Master file Sequential file Transaction file None of these Random file Master file Sequential file Transaction file ANSWER DOWNLOAD EXAMIANS APP