Option A: Vertical justifying
Option B: Vertical adjusting
Option C: Dual centering
Option D: Horizontal centering
Correct Answer: Vertical justifying ✔
Click for More Details
Option A: Printing
Option B: Output
Option C: Solid state
Option D: Input
Correct Answer: D. Input ✔
Click for More Details
Option A: DBMS
Option B: Suites
Option C: Spreadsheets
Option D: Word processors
Correct Answer: D. Word processors ✔
Click for More Details
Option A: Desktop
Option B: Network client
Option C: Network server
Option D: Network station
Correct Answer: Network server ✔
Click for More Details
Option A: Backup
Option B: Disk cleanup
Option C: Disk Defragmenter
Option D: Restore
Correct Answer: Disk Defragmenter ✔
Click for More Details
Option A: anchor
Option B: URL
Option C: hyperlink
Option D: reference
Correct Answer: hyperlink ✔
Click for More Details
Option A: Microprocessor
Option B: Arithmetic/Logic
Option C: Output
Option D: ROM
Correct Answer: Arithmetic/Logic ✔
Click for More Details
Option A: click on it
Option B: collapse it
Option C: name it
Option D: give it a password
Correct Answer: click on it ✔
Click for More Details
Option A: supercomputer
Option B: personal computer
Option C: Laptop
Option D: PDA
Correct Answer: PDA ✔
Click for More Details
Option A: Central
Option B: Common
Option C: Convenient
Option D: Computer
Correct Answer: Central ✔
Click for More Details
Option A: Analog computer
Option B: Digital computer
Option C: both
Option D: Hybrid Computer
Correct Answer: Digital computer ✔
Click for More Details
Option A: Software
Option B: Hardware
Option C: Human ware
Option D: All of these
Correct Answer: Hardware ✔
Click for More Details
Option A: Digital
Option B: Hybrid
Option C: Analog
Option D: Complex
Correct Answer: Digital ✔
Click for More Details
Option A: Analog
Option B: Digital
Option C: Hybrid
Option D: All of these
Correct Answer: Hybrid ✔
Click for More Details
Option A: MS Word
Option B: Editors
Option C: PowerPoint
Option D: MS publisher
Correct Answer: Editors ✔
Click for More Details
Option A: Node operating system
Option B: Non-open software
Option C: Network Operating system
Option D: Non-operating software
Correct Answer: Network Operating system ✔
Click for More Details
Option A: IP address
Option B: Domains
Option C: Protocol
Option D: Gateway
Correct Answer: Protocol ✔
Click for More Details
Option A: Limited Area Network
Option B: Logical Area Network
Option C: Local Area Network
Option D: Large Area Network
Correct Answer: Local Area Network ✔
Click for More Details
Option A: Voice over IP
Option B: Video over IP
Option C: Viruses over IP
Option D: Virtual over IP
Correct Answer: Voice over IP ✔
Click for More Details
Option A: LAN
Option B: WAN
Option C: MAN
Option D: BUS
Correct Answer: BUS ✔
Click for More Details
Option A: Maximum Area Network
Option B: Minimum Area Network
Option C: Main Area Network
Option D: Metropolitan Area Network
Correct Answer: Metropolitan Area Network ✔
Click for More Details
Option A: System software
Option B: Application software
Option C: Assemblers
Option D: Compilers
Correct Answer: Application software ✔
Click for More Details
Option A: Trackball
Option B: Joystick
Option C: Light pen
Option D: Plotters
Correct Answer: Plotters ✔
Click for More Details
Option A: Input device
Option B: Output device
Option C: Both A & B above
Option D: None of these
Correct Answer: C. Both A & B above ✔
Click for More Details
Option A: Digital computer
Option B: Mainframe computer
Option C: Portable computer
Option D: Hybrid computer
Correct Answer: Portable computer ✔
Click for More Details
Option A: Micro
Option B: Mainframe
Option C: Super
Option D: Mini
Correct Answer: Mainframe ✔
Click for More Details
Option A: Micro
Option B: Mainframe
Option C: Super
Option D: Mini
Correct Answer: Mini ✔
Click for More Details
Option A: Keyboard
Option B: Mouse
Option C: Monitor
Option D: Mother board
Correct Answer: Monitor ✔
Click for More Details
Option A: Hybrid
Option B: Digital
Option C: Desktop
Option D: Laptop
Correct Answer: Desktop ✔
Click for More Details
Option A: Portable computer
Option B: Hybrid computer
Option C: Analog computer
Option D: Digital computer
Correct Answer: Digital computer ✔
Click for More Details
Option A: J.V. Attansoff
Option B: Bill Gates
Option C: Simur Cray
Option D: Winton Serf
Correct Answer: J.V. Attansoff ✔
Click for More Details
Option A: Cracking
Option B: Jacking
Option C: Spoofing
Option D: Smarming
Correct Answer: Cracking ✔
Click for More Details
Option A: Computer forensics
Option B: Computer crime
Option C: Hacking
Option D: Cracking
Correct Answer: Computer crime ✔
Click for More Details
Option A: Encryption program
Option B: Surge protector
Option C: Firewall
Option D: UPS
Correct Answer: UPS ✔
Click for More Details
Option A: Encryption
Option B: a firewall
Option C: Scrambling
Option D: Password proofing
Correct Answer: Encryption ✔
Click for More Details
Option A: Hacker-proof program
Option B: Firewall
Option C: Hacker-resistant server
Option D: Encryption safe wall
Correct Answer: Firewall ✔
Click for More Details
Option A: User logins
Option B: Passwords
Option C: Computer keys
Option D: Access-control software
Correct Answer: Passwords ✔
Click for More Details
Option A: Biometrics
Option B: Bio measurement
Option C: Computer security
Option D: Smart weapon machinery
Correct Answer: Biometrics ✔
Click for More Details
Option A: A virus
Option B: Spybot
Option C: Logic bomb
Option D: Security patch
Correct Answer: Spybot ✔
Click for More Details
Option A: Time-related bomb sequence.
Option B: Virus.
Option C: Time bomb.
Option D: Trojan horse.
Correct Answer: Time bomb. ✔
Click for More Details
Option A: Memory or disk space.
Option B: Time.
Option C: CD drives space.
Option D: CD-RW.
Correct Answer: Memory or disk space. ✔
Click for More Details
Option A: Time bomb
Option B: Worm
Option C: Melissa virus
Option D: Macro virus
Correct Answer: Worm ✔
Click for More Details
Option A: E-mail virus.
Option B: Macro virus.
Option C: Trojan horse.
Option D: Time bomb.
Correct Answer: E-mail virus. ✔
Click for More Details
Option A: Trojan horse.
Option B: Virus.
Option C: Time bomb.
Option D: Time-related bomb sequence.
Correct Answer: Virus. ✔
Click for More Details
A program that performs a useful task while simultaneously allowing destructive acts is a__________?
Option A: Worm.
Option B: Trojan horse.
Option C: Virus.
Option D: Macro virus
Correct Answer: Trojan horse. ✔
Click for More Details
Option A: Badware.
Option B: Malware.
Option C: Maliciousware.
Option D: Illegalware
Correct Answer: Malware. ✔
Click for More Details
Option A: Spooling.
Option B: Identity theft.
Option C: Spoofing.
Option D: Hacking.
Correct Answer: Identity theft. ✔
Click for More Details
Option A: Jacking.
Option B: Identity theft.
Option C: Spoofing.
Option D: Hacking.
Correct Answer: Spoofing. ✔
Click for More Details
Option A: Young hacker.
Option B: Trusted employee with no criminal record.
Option C: Trusted employee with a long, but unknown criminal record.
Option D: Overseas young cracker.
Correct Answer: Trusted employee with no criminal record. ✔
Click for More Details
Option A: Key Block
Option B: Kernel Boot
Option C: Kilo Byte
Option D: Kit Bit
Correct Answer: Kilo Byte ✔
Click for More Details
Option A: Hard disk
Option B: Flash drive
Option C: DVD
Option D: scanner
Correct Answer: scanner ✔
Click for More Details
Option A: Online processing
Option B: Batch Processing
Option C: Once-a-day Processing
Option D: End-of-day processing
Correct Answer: Batch Processing ✔
Click for More Details
Option A: a telephone line
Option B: a keyboard
Option C: a printer
Option D: a monitor
Correct Answer: a telephone line ✔
Click for More Details
Option A: Operating System File
Option B: Transaction file
Option C: Software File
Option D: Master file
Correct Answer: Master file ✔
Click for More Details
Option A: Megabyte
Option B: Gigabyte
Option C: Terabyte
Option D: None of these
Correct Answer: Megabyte ✔
Click for More Details
Option A: ROM
Option B: RAM
Option C: Floppy Disk
Option D: Hard Disk
Correct Answer: RAM ✔
Click for More Details
Option A: 001
Option B: 101
Option C: 202
Option D: 110
Correct Answer: 202 ✔
Click for More Details
Option A: Ancient system
Option B: Historical system
Option C: Age old system
Option D: Legacy system
Correct Answer: Legacy system ✔
Click for More Details
Option A: Integrity Test
Option B: Power-On Self-Test
Option C: Correct Functioning Test
Option D: Reliability Test
Correct Answer: Power-On Self-Test ✔
Click for More Details
Option A: The scanner
Option B: The main storage
Option C: The secondary storage
Option D: The processor
Correct Answer: The processor ✔
Click for More Details
Option A: 256 different characters
Option B: 512 different characters
Option C: 1024 different characters
Option D: 128 different characters
Correct Answer: 128 different characters ✔
Click for More Details
Option A: Downloading
Option B: uploading
Option C: FTP
Option D: JPEG
Correct Answer: Downloading ✔
Click for More Details
Option A: hard disk
Option B: optical disc
Option C: output device
Option D: solid-state storage device
Correct Answer: optical disc ✔
Click for More Details
Option A: Dragging
Option B: dropping
Option C: right-clicking
Option D: shift-clicking
Correct Answer: right-clicking ✔
Click for More Details
Option A: Hacker
Option B: spammer
Option C: instant messenger
Option D: programmer
Correct Answer: Hacker ✔
Click for More Details
Option A: Distributed
Option B: free
Option C: centralized
Option D: none of these
Correct Answer: none of these ✔
Click for More Details
Option A: magnetic storage
Option B: Flash memory
Option C: optical
Option D: Both A & B
Correct Answer: Both A & B ✔
Click for More Details
Option A: It is not unethical, because it is legal.
Option B: It is unethical because the files are being given for free.
Option C: Sharing copyrighted files without permission breaks copyright laws.
Option D: It is not unethical because the files are being given for free.
Correct Answer: Sharing copyrighted files without permission breaks copyright laws. ✔
Click for More Details
Option A: an ASCII code
Option B: a magnetic tape
Option C: an OCR scanner
Option D: a bar code
Correct Answer: a bar code ✔
Click for More Details
Option A: Cookies
Option B: Plug-ins
Option C: Scripts
Option D: ASPs
Correct Answer: Cookies ✔
Click for More Details
Option A: Rule discover
Option B: Signal processing
Option C: Neural nets
Option D: Case-based reasoning
Correct Answer: Neural nets ✔
Click for More Details
Option A: RAM
Option B: ROM
Option C: BIOS
Option D: CACHE
Correct Answer: RAM ✔
Click for More Details
Option A: robotics
Option B: simulation
Option C: computer forensics
Option D: animation
Correct Answer: computer forensics ✔
Click for More Details
Option A: upgrading
Option B: processing
Option C: batching
Option D: utilizing
Correct Answer: processing ✔
Click for More Details
Option A: multimedia
Option B: word
Option C: numbers
Option D: characters
Correct Answer: numbers ✔
Click for More Details
Option A: End user
Option B: System Analyst
Option C: Programmer
Option D: All of the above
Correct Answer: System Analyst ✔
Click for More Details
Option A: Nanoscience
Option B: Nanotechnology
Option C: Simulation
Option D: Artificial intelligence (Al)
Correct Answer: Artificial intelligence (Al) ✔
Click for More Details
Option A: expansion board
Option B: motherboard
Option C: storage device
Option D: output device
Correct Answer: motherboard ✔
Click for More Details
Option A: hard disk drives
Option B: printers
Option C: floppy disk drives
Option D: CD drives
Correct Answer: printers ✔
Click for More Details
Option A: gathering data
Option B: processing data into information
Option C: analyzing the data or information
Option D: storing the data or information
Correct Answer: analyzing the data or information ✔
Click for More Details
Option A: hackers
Option B: Spam
Option C: Viruses
Option D: identity theft
Correct Answer: Spam ✔
Click for More Details
Option A: Common Business Oriented Language
Option B: Computer Business Oriented Language
Option C: Common Business Operated Language
Option D: Common Business Organized Language
Correct Answer: Common Business Oriented Language ✔
Click for More Details
Option A: dialog box
Option B: submenu
Option C: menu selection
Option D: All of the above
Correct Answer: dialog box ✔
Click for More Details
Option A: Operating system
Option B: Interpreter
Option C: Compiler
Option D: Assembler
Correct Answer: Operating system ✔
Click for More Details
__________Store data or information temporarily and pass it on as directed by the control unit?
Option A: Address
Option B: Register
Option C: Number
Option D: Memory
Correct Answer: Register ✔
Click for More Details
Option A: MS-Excel
Option B: BASIC
Option C: COBOL
Option D: C++
Correct Answer: MS-Excel ✔
Click for More Details
Option A: Secondary memory
Option B: Primary memory
Option C: Main memory
Option D: Both (1) and (2)
Correct Answer: Secondary memory ✔
Click for More Details
Option A: Secondary memory
Option B: Primary memory
Option C: Both A. and B.
Option D: none
Correct Answer: Primary memory ✔
Click for More Details
Option A: Processing
Option B: Storing
Option C: Editing
Option D: Sorting
Correct Answer: Processing ✔
Click for More Details
Option A: Multitasking
Option B: Multithreading
Option C: Multiprocessing
Option D: Multicomputing
Correct Answer: Multitasking ✔
Click for More Details
Option A: Sequential access
Option B: Random access
Option C: Quick access
Option D: All of the above
Correct Answer: Random access ✔
Click for More Details
Option A: output device
Option B: input device
Option C: storage device
Option D: processing device
Correct Answer: input device ✔
Click for More Details
Option A: First Generation
Option B: Second Generation
Option C: Third Generation
Option D: Fourth Generation
Correct Answer: Third Generation ✔
Click for More Details
Option A: A. RAM
Option B: ROM
Option C: LSIC
Option D: PROM
Correct Answer: ROM ✔
Click for More Details
Option A: land-line device
Option B: On-line device
Option C: Off-line device
Option D: Device
Correct Answer: Off-line device ✔
Click for More Details
Option A: data migration rate
Option B: data digitizing rate
Option C: data transfer rate
Option D: data access rate
Correct Answer: data transfer rate ✔
Click for More Details
Option A: Application software
Option B: System software
Option C: Software
Option D: None of these
Correct Answer: System software ✔
Click for More Details
Option A: RAM
Option B: ROM
Option C: BIOS
Option D: CACHE
Correct Answer: ROM ✔
Click for More Details