Computer Basic Information Software programs that close potential security breaches in an operating system are known as: Security repairs Security patches Refresh patches Security breach fixes Security repairs Security patches Refresh patches Security breach fixes ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Spooling Identity Theft Hacking Spoofing Spooling Identity Theft Hacking Spoofing ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following statements is FALSE concerning file? Every file in the same foldr must have a unique name None of these File extension is another name for file type Files may share the same name or the same extension but not both The file extension comes before the dot (.) followed by the file name Every file in the same foldr must have a unique name None of these File extension is another name for file type Files may share the same name or the same extension but not both The file extension comes before the dot (.) followed by the file name ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A device which converts human readable data into machine language is Card reader Card punch Character reader Punched paper tape None of these Card reader Card punch Character reader Punched paper tape None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A step-by-step procedure used to solve a problem is called None of these Operating system Algorithm All of these Application program None of these Operating system Algorithm All of these Application program ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Hard disks are formatted in the same manner as floppy disks. However, before a hard disk can be formatted, it must first be _____ partitioned write protected deleted sectioned inter-sectioned partitioned write protected deleted sectioned inter-sectioned ANSWER DOWNLOAD EXAMIANS APP