Question
a.
Firewall
b.
Scanner
c.
Hub
d.
Snort
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following protects the system from hackers ?
Similar Questions
Discover Related MCQs
Q. The clock rate of a processor is measured in
View solution
Q. The acronym WORM in a computer system and used in optical technology stands for
View solution
Q. Which of the following places the common date elements in order from smallest to largest ?
View solution
Q. What is the full form of MSDN, a resource for developers ?
View solution
Q. Word processing, spread sheet, and photo editing are examples of
View solution
Q. All the following are examples of input devices EXCEPT a
View solution
Q. The components that process data are related
View solution
Q. ________ is any part of computer that can be touched
View solution
Q. Computers use the________ language to process data
View solution
Q. The name for the way that computers manipulate data into information is called
View solution
Q. Surgeons can perform delicate operations by manipulating devices through computer instead of manually. This technology is known as
View solution
Q. Which of the following are not the four major data processing functions of a computer?
View solution
Q. ______ terminals (fomerly known as cash registers) are often connected to complex inventory and sales computer system
View solution
Q. The process of _______ is used by large retailers to study trends
View solution
Q. The name of a Microsoft Office Word document is displayed in both the ________ and the taskbar
View solution
Q. The display size of a monitor is measured
View solution
Q. The permanently etched program in ROM that automatically begins executing the computer instructions is the
View solution
Q. The Open, Print, and Save buttons are all located on the
View solution
Q. Operating systems and utility programs are in a class of software known as
View solution
Q. The most widely used code that represents each character as a unique 8-bit code is
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!