• The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: Computer forensics.
    • To access properties of an object, the mouse technique to use is: Right-clicking.
    • The smallest storage unit among the given options is: D. None of these.
    • A program that performs a useful task while allowing destructive acts is a: Trojan horse.
    • The scrambling of code is known as: Encryption.
    • Notebook, laptop, palm, and handheld computers come under the category of: Portable computer.
    • System software used to facilitate editing of text and data is: Editors.
    • A utility program in Windows that locates and eliminates unnecessary fragments and optimizes disk space: Disk Defragmenter.
    • A detailed written description of the programming cycle, program, test results, and printout: Documentation.
    • Microprocessors can be used to make: All of the above (Computer, Digital systems, Calculators).
    • In full-duplex mode, the communication channel is used in both directions at the same time.
    • CSS stands for: Cascading Style Sheets.
    • The device used to process data is: CPU.
    • Shortcut key to create a new folder on a Windows PC is: Ctrl+Shift+N.
    • ISP stands for: Internet Service Provider.
    • Digital computer was invented by: John Vincent Atanasoff.
    • The Melissa virus, widely publicized in 1999, was an: E-mail virus.
    • Shortcut to insert a new slide in the current presentation in PowerPoint: Ctrl+M.
    • DMA stands for: Direct Memory Access.
    • Computers that are also called personal computers are: Micro Computers.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top