Computer Basic Information If you want to secure a message, use a(n): Encryption key Cryptology source Cryptosystem Encryption software package Encryption key Cryptology source Cryptosystem Encryption software package ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The 2's complement of a binary no. is obtained by adding.....to its 1's complement. 10 1 None of these 12 10 1 None of these 12 ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The total number of messages handled by a computerized telephone system on a daily basis is an example of: Frequency None of these Volume Updating All of these Frequency None of these Volume Updating All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Any type of storage that is used for holding information between steps in its processing is None of these Primary storage Internal storage CPU Intermediate storage None of these Primary storage Internal storage CPU Intermediate storage ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information When the pointer is positioned on a _____ it is shaped like a hand. Grammar error Formatting error Screen tip Spelling error Hyperlink Grammar error Formatting error Screen tip Spelling error Hyperlink ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The 'IC' chip, used in computers, is made of Silica Iron Oxide None of these Chomium Silicon Silica Iron Oxide None of these Chomium Silicon ANSWER DOWNLOAD EXAMIANS APP