Computer Basic Information If you want to secure a message, use a(n): Encryption software package Encryption key Cryptosystem Cryptology source Encryption software package Encryption key Cryptosystem Cryptology source ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A storage device which is used to store data & information external to the main storage is known as None of these Backing storage Buffer PROM Accumulator None of these Backing storage Buffer PROM Accumulator ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The magnetic disks and drums are like recirculating shift registers because their storage is non volatile stored data is available for reading over and over again in the same order. they have about the same storage capacity their access times are about the same None of these their storage is non volatile stored data is available for reading over and over again in the same order. they have about the same storage capacity their access times are about the same None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Viruses are called that because They are viruses They can copy themselves and spread. None of these Both A and B They are viruses They can copy themselves and spread. None of these Both A and B ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What does the SMTP in an SMTP server stand for? None of these Simple Mail Transfer Protocol Serve Message Text Process Short Messaging Text Process Short Messaging Transfer Protocol None of these Simple Mail Transfer Protocol Serve Message Text Process Short Messaging Text Process Short Messaging Transfer Protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following is the 1's complement of 10? 10 110 1 11 None of these 10 110 1 11 None of these ANSWER DOWNLOAD EXAMIANS APP