The unauthorised reproduction in the computer crime is considered as:
What is the process of loading the operating system files into dynamic random access memory?
Which technology is used in the processor of a computer to simulates a single processor into two virtual processors to the operating system?
When a key is pressed on the keyboard, which standard is used for converting the keystroke into corresponding bits ?
Software, such as Explorer & Firefox referred to as ____
Which of the following is not an output device ?
Which technology is used in compact disks ?
The program which are as permanent as hardware and stored in ROM is known as
Which access method is used for obtaining a record from a cassette tape ?
ASCII stands for
Which of the following identifies a specific webpage and its computer on the web ?
An optical input device that interprets pencil mark on paper media is
Information Technology Act was enacted on ____
Father of cell phone
ഇന്ത്യയിലെ ആദ്യത്തെ ഇന്റര്നെറ്റ് പത്രം ഏതാണ്?