Computer Basic Information If you want to secure a message, use a(n): Cryptology source Encryption key Cryptosystem Encryption software package Cryptology source Encryption key Cryptosystem Encryption software package ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Third generation computers used transistors instead of vacuum tubes were the first to use built-in error detecting devices All of these were the first to use neural network None of these used transistors instead of vacuum tubes were the first to use built-in error detecting devices All of these were the first to use neural network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Who is 1988 announced the latest version of CD-ROM called CD-ROMXA (extended architecture) which provides a documented means of integrating digital audio with computer data on a CD-ROM disk? Philips None of these Microsoft All of these Sony Philips None of these Microsoft All of these Sony ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A prefix for billion which is equal to _____ is called as billi. 10 100 None of these 10000 1000 10 100 None of these 10000 1000 ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Bubble memory is a Direct access device only Sequential access device only Combination of sequential and direct access devices All of these None of these Direct access device only Sequential access device only Combination of sequential and direct access devices All of these None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information As compared to diskettes, the hard disks are slowly accessed less rigid more expensive None of these more portable slowly accessed less rigid more expensive None of these more portable ANSWER DOWNLOAD EXAMIANS APP