adplus-dvertising
frame-decoration

Question

When installing ______ The user must copy usually decompress program file from CDROM or medium to the hard disk.

a.

Programming software

b.

System hardware

c.

Application hardware

d.

Application software

Answer: (a).Programming software

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When installing ______ The user must copy usually decompress program file from CDROM or medium to the hard disk.

Similar Questions

Discover Related MCQs

Q. A collection of interrelated file in computer is a-

Q. A collection of 8 bit is called -

Q. General purpose computer are those that can be adopted to countless uses simply by changing its-

Q. Memory in which any location can be reached in a fixed and short amount of time after specifying its address is called -

Q. To delete an incorrect character in a document, ______ to erase to the right of the insertion point.

Q. The operating system does all of the following except-

Q. All of the following are steps involved in the boot process except-

Q. The ______ storage on ROM chip, is responsible for loading the operating system from its permanent location on the hard drive in to RAM.

Q. The basic input/output system (BIOS) is storage in-

Q. Ensuring that the essential peripheral devices are attached and operational is the ____ Process.

Q. Hyper-threading (HT) is related to-

Q. Intel and AMD are leaders in-

Q. IDE (ATE) or SATA interface connect Mother board with-

Q. USB is a type of-

Q. Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-

Q. Process of Combining strings is known as

Q. A program that performs a useful task while simultaneously allowing destructive acts is:

Q. In 1999, the Melissa virus was a widely publicized:

Q. An intentionally disruptive program that spreads from program to program or from disk to disk is known as

Q. The majority of computer crimes are committed by: