Computer Basic Information The methods used by COBOL to define that structure of a data item in terms of characters, digits, etc. is None of these Picture Overlay Password Pointer None of these Picture Overlay Password Pointer ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Software programs that close potential security breaches in an operating system are known as: Security patches Security repairs Refresh patches Security breach fixes Security patches Security repairs Refresh patches Security breach fixes ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The punched card used in the IBM System/3 contains 120 columns 126 columns None of these 96 columns 80 columns 120 columns 126 columns None of these 96 columns 80 columns ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which gate sends on a pulse when it receives one at either or both of its terminals. NAND NOR None of these NOT OR NAND NOR None of these NOT OR ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The data recording area between the blank gaps on magnetic tape is called a/ an: Database Block None of these Field Record Database Block None of these Field Record ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A byte represents a group of 10 bits 8 bits 22 bits 40 bits 10 bits 8 bits 22 bits 40 bits ANSWER DOWNLOAD EXAMIANS APP