Computer Basic Information Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): Hacker-proof program Hacker-resistant server Firewall Encryption safe wall Hacker-proof program Hacker-resistant server Firewall Encryption safe wall ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Primary storage is _____ as compared to secondary storage. None of these Slow and inexpensive Fast and inexpensive Slow and expensive Fast and expensive None of these Slow and inexpensive Fast and inexpensive Slow and expensive Fast and expensive ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A technique for processing jobs on a first-come, first-served basis is known as FAX FIFO GIGO cable None of these Optical mark reader FAX FIFO GIGO cable None of these Optical mark reader ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following file organizations is most efficient for a file with a high degree of file activity? VSAM sequential All of these ISAM B-Tree index VSAM sequential All of these ISAM B-Tree index ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What are the concentric circles on floppy disks know as? Cylinders None of these Tracks Segments Sectors Cylinders None of these Tracks Segments Sectors ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information When an input electrical signal A=10100 is applied to a NOT gate, its output signal is 10101 10001 None of these 101 1011 10101 10001 None of these 101 1011 ANSWER DOWNLOAD EXAMIANS APP