Computer Basic Information Software programs that close potential security breaches in an operating system are known as: Security patches Refresh patches Security breach fixes Security repairs Security patches Refresh patches Security breach fixes Security repairs ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A websites main page is called its- Home page Search page Browser page Bookmark page Home page Search page Browser page Bookmark page ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information An intentionally disruptive program that spreads from program to program or from disk to disk is known as Virus Time related bomb sequence Trojan horse Time bomb Virus Time related bomb sequence Trojan horse Time bomb ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which one of the following is not an application software package? Adobe Pagemaker Red Hat Linux Microsoft Office Open Office None of these Adobe Pagemaker Red Hat Linux Microsoft Office Open Office None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What is the number of bits needed for an address in a 4K memory? 12 None of these 4 8 16 12 None of these 4 8 16 ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The primary advantage of key-to-tape data-entry systems is: The tape is reusable Keying errors can be detected as they occur A large percentage of editing can be performed at the time of data entry Key verification is easily performed All of these The tape is reusable Keying errors can be detected as they occur A large percentage of editing can be performed at the time of data entry Key verification is easily performed All of these ANSWER DOWNLOAD EXAMIANS APP