Question
a.
a telephone line
b.
a keyboard
c.
a printer
d.
a monitor
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. A modem is connected to
Similar Questions
Discover Related MCQs
Q. Large transaction processing systems in automated organisations use
View solution
Q. Which of the following is NOT one of the four major data processing functions of a computer?
View solution
Q. Servers are computers that provide resources to other computers connected to a :
View solution
Q. The difference between people with access to computers and the Internet and those without this access is known as the :
View solution
Q. The typical computer criminal is a(n):
View solution
Q. The common name for the crime of stealing passwords is:
View solution
Q. Collecting personal information and effectively posing as another individual is known as the crime of:
View solution
Q. Malicious software is known as:
View solution
Q. A program that performs a useful task while simultaneously allowing destructive acts is
View solution
Q. An intentionally disruptive program that spreads from program to program or from disk
to disk is known as a:
View solution
Q. In 1999, the Melissa virus was a widely publicised:
View solution
Q. What type of virus uses computer hosts to reproduce itself?
View solution
Q. The thing that eventually terminates a worm virus is a lack of:
View solution
Q. When a logic bomb is activated by a time-related event, it is known as a:
View solution
Q. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
View solution
Q. What is the name of an application program that gathers user information and sends it
to someone through the Internet?
View solution
Q. —— is the measurement of things such as fingerprints and retinal scans used for
security access.
View solution
Q. What is the most common tool used to restrict access to a computer system?
View solution
Q. Hardware or software designed to guard against unauthorized access to a computer
network is known as a(n):
View solution
Q. The scrambling of code is known as:
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!