The majority of computer crimes are committed by: Overseas criminals Insiders Hackers Young teenage computer geniuses TRUE ANSWER : ? YOUR ANSWER : ?
A computer will function only if it has a control unit has a program in its memory None of these is given input data has software package TRUE ANSWER : ? YOUR ANSWER : ?
When was the world's first laptop computer introduced in the market and by whom? Hewlett-Packard, 1980 Laplink Travelling Software Inc, 1982. Tandy Model-200, 1985 None of these Epson, 1981 TRUE ANSWER : ? YOUR ANSWER : ?
Which 32-bit microprocessor is used in IBM's PS/2 model-80 computer? 80486 None of these 80286 80386 8088 TRUE ANSWER : ? YOUR ANSWER : ?
In 1999, the Melissa virus was a widely publicized: Trojan Horse E-mail virus Time Bomb Macro virus TRUE ANSWER : ? YOUR ANSWER : ?
A notation used to express clearly on algorithm is known as High level language Machine language Algorithmic language Assembly language None of these TRUE ANSWER : ? YOUR ANSWER : ?
For a memory system, the cycle time is shorter than the access time None of these same as the access time longer than the access time submultiple of the access time TRUE ANSWER : ? YOUR ANSWER : ?
Sequential file organization is most appropriate for which of the following applications? payroll bank checking accounts None of these grocery-store checkout airline reservations TRUE ANSWER : ? YOUR ANSWER : ?
The bubbles in a bubble memory pack are created with the help of? Electric field None of these X-ray Magnetic field Laser beam TRUE ANSWER : ? YOUR ANSWER : ?
A method for representing digital data analog signals by changing the phase of the analog carrier to represent the digital information is known as PM PSK PM None of these PIA TRUE ANSWER : ? YOUR ANSWER : ?