A. Central B. Common C. Convenient D. Computer E. None of these
A. Dragging B. dropping C. right-clicking D. shift-clicking
A. hackers B. Spam C. Viruses D. identity theft
A. Node operating system B. Non-open software C. Network Operating system D. Non-operating software
A. IP address B. Domains C. Protocol D. Gateway
A. Voice over IP B. Video over IP C. Viruses over IP D. Virtual over IP
A. Maximum Area Network B. Minimum Area Network C. Main Area Network D. Metropolitan Area Network
A. Trojan horse. B. Virus. C. Time bomb. D. Time-related bomb sequence.
A. Tracking B. Formatting C. Crashing D. Allotting
A. Hard disk B. Flash drive C. DVD D. scanner
A. Downloading B. uploading C. FTP D. JPEG
A. End user B. System Analyst C. Programmer D. All of the above
A. digital device B. system add-on C. disk pack D. peripheral device
A. Biometrics B. Bio measurement C. Computer security D. Smart weapon machinery
A. robotics B. simulation C. computer forensics D. animation
A. Portable computer B. Hybrid computer C. Analog computer D. Digital computer
A. To inspect B. To examine C. To hear D. To investigate