Computer Basic Information When a logic bomb is activated by a time-related event, it is known as a: Time-related bomb sequence Trojan horse Virus Time bomb Time-related bomb sequence Trojan horse Virus Time bomb ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Punched-card equipment was first introduced in Britain in 1904 by a small company. What was the name of that company? Accounting & Tabulating Corpn. of Great Britain The Tabulator Ltd. International Business Machines (IBM) Tabulator Machine Company None of these Accounting & Tabulating Corpn. of Great Britain The Tabulator Ltd. International Business Machines (IBM) Tabulator Machine Company None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A common boundary between two systems is called None of these Interdiction Interface Surface None of these Interdiction Interface Surface ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The CPU of a computer transfers print output to a temporary disk memory at high speed and then gets back to processing another job without waiting for the output to got to the printer. In this way, the CPU does not remain idle due to its own high speed as compared to the low speed of the printer. What is the name of this memory? External memory ROM Buffer memory None of these I/O memory External memory ROM Buffer memory None of these I/O memory ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A new technology which provides the ability to create an artificial world and have people interact with it is called 3-D reality None of these virtual reality televirtuality alternative reality 3-D reality None of these virtual reality televirtuality alternative reality ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which one of the following would be considered as a way that a computer virus can enter a computer system? Viewing a website without causing any additional transactions Borrowed an illegal copy of software Running antivirus programs None of these Opening an application previously installed on the computer Viewing a website without causing any additional transactions Borrowed an illegal copy of software Running antivirus programs None of these Opening an application previously installed on the computer ANSWER DOWNLOAD EXAMIANS APP