Which of the following are examples of real security and privacy risks EXCEPT:
Which of the following is not a web browser ?
Which technology is used in Compact disks ?
At which of the following sites would you most probably buy books?
A computer program that converts an entire program into machine language is called a/an:
Which of the following crimes cannot be easily committed through the assistance or use of a computer ?
A _______ is approximately one billion bytes:
Viruses, trojan horses and worms are:
An error in software or hardware is called is a bug. What is the alternative computer jargon for it?
Which of the following provides Vital Services for telecommunications and disaster warming needs of India ?
The resolution of a computer monitor is determined by:
Which of the following is an impact printer ?
Pick the odd one out :
The maximum speed at which data, can be transferred between two modes on a network is called:
The means by which all computers connected to the internet identify each other is