adplus-dvertising
frame-decoration

Question

When installing ______ The user must copy usually decompress program file from CDROM or medium to the hard disk.

a.

Programming software

b.

System hardware

c.

Application hardware

d.

Application software

Posted under IT Fundamentals

Answer: (a).Programming software

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When installing ______ The user must copy usually decompress program file from CDROM or medium to the hard disk.

Similar Questions

Discover Related MCQs

Q. A collection of interrelated file in computer is a-

Q. A collection of 8 bit is called -

Q. General purpose computer are those that can be adopted to countless uses simply by changing its-

Q. Memory in which any location can be reached in a fixed and short amount of time after specifying its address is called -

Q. To delete an incorrect character in a document, ______ to erase to the right of the insertion point.

Q. The operating system does all of the following except-

Q. All of the following are steps involved in the boot process except-

Q. The ______ storage on ROM chip, is responsible for loading the operating system from its permanent location on the hard drive in to RAM.

Q. The basic input/output system (BIOS) is storage in-

Q. Ensuring that the essential peripheral devices are attached and operational is the ____ Process.

Q. Hyper-threading (HT) is related to-

Q. Intel and AMD are leaders in-

Q. IDE (ATE) or SATA interface connect Mother board with-

Q. USB is a type of-

Q. Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-

Q. Process of Combining strings is known as

Q. A program that performs a useful task while simultaneously allowing destructive acts is:

Q. In 1999, the Melissa virus was a widely publicized:

Q. An intentionally disruptive program that spreads from program to program or from disk to disk is known as

Q. The majority of computer crimes are committed by: