Computer Basic Information The light pen was developed in 1942 1976 1992 None of these 1955 1942 1976 1992 None of these 1955 ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following transfers data contained on computer cards to the computer system. Magnetic disk Card reader Magnetic tape None of these Card sorter Magnetic disk Card reader Magnetic tape None of these Card sorter ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A factor which might cause an individual to consider using a computer in criminal activities is: EFTS (Electronic Funds Transfer System) None of these The speed with which the crime can be accomplished The computer's access to large sums of money All listed here EFTS (Electronic Funds Transfer System) None of these The speed with which the crime can be accomplished The computer's access to large sums of money All listed here ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): Firewall Hacker-proof program Hacker-resistant server Encryption safe wall Firewall Hacker-proof program Hacker-resistant server Encryption safe wall ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A database management system based on the concept of ownership is Network layer Network license system None of these Network database system Network topology Network layer Network license system None of these Network database system Network topology ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The code for a Web page is written using _____ . Win Zip A fifth generation language URL Peripherals Hypertext Markup Language Win Zip A fifth generation language URL Peripherals Hypertext Markup Language ANSWER DOWNLOAD EXAMIANS APP