adplus-dvertising
frame-decoration

Question

Servers are computers that provide resources to other computers connected to a :

a.

networked

b.

mainframe

c.

supercomputer

d.

client

Posted under IT Fundamentals

Answer: (b).mainframe

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Servers are computers that provide resources to other computers connected to a :

Similar Questions

Discover Related MCQs

Q. The difference between people with access to computers and the Internet and those without this access is known as the :

Q. The typical computer criminal is a(n):

Q. The common name for the crime of stealing passwords is:

Q. Collecting personal information and effectively posing as another individual is known as the crime of:

Q. Malicious software is known as:

Q. A program that performs a useful task while simultaneously allowing destructive acts is

Q. An intentionally disruptive program that spreads from program to program or from disk
to disk is known as a:

Q. In 1999, the Melissa virus was a widely publicised:

Q. What type of virus uses computer hosts to reproduce itself?

Q. The thing that eventually terminates a worm virus is a lack of:

Q. When a logic bomb is activated by a time-related event, it is known as a:

Q. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

Q. What is the name of an application program that gathers user information and sends it
to someone through the Internet?

Q. —— is the measurement of things such as fingerprints and retinal scans used for
security access.

Q. What is the most common tool used to restrict access to a computer system?

Q. Hardware or software designed to guard against unauthorized access to a computer
network is known as a(n):

Q. The scrambling of code is known as:

Q. To prevent the loss of data during power failures, use a(n):

Q. ——Is defined as any crime completed through the use of computer technology.

Q. —— refers to electronic trespassing or criminal hacking.