The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: Computer forensics.
To access properties of an object, the mouse technique to use is: Right-clicking.
The smallest storage unit among the given options is: D. None of these.
A program that performs a useful task while allowing destructive acts is a: Trojan horse.
The scrambling of code is known as: Encryption.
Notebook, laptop, palm, and handheld computers come under the category of: Portable computer.
System software used to facilitate editing of text and data is: Editors.
A utility program in Windows that locates and eliminates unnecessary fragments and optimizes disk space: Disk Defragmenter.
A detailed written description of the programming cycle, program, test results, and printout: Documentation.
Microprocessors can be used to make: All of the above (Computer, Digital systems, Calculators).
In full-duplex mode, the communication channel is used in both directions at the same time.
CSS stands for: Cascading Style Sheets.
The device used to process data is: CPU.
Shortcut key to create a new folder on a Windows PC is: Ctrl+Shift+N.
ISP stands for: Internet Service Provider.
Digital computer was invented by: John Vincent Atanasoff.
The Melissa virus, widely publicized in 1999, was an: E-mail virus.
Shortcut to insert a new slide in the current presentation in PowerPoint: Ctrl+M.
DMA stands for: Direct Memory Access.
Computers that are also called personal computers are: Micro Computers.