CRACKING comes under ___________
website service
transcription
computer crime
data security
Correct answer is C
Computer crime. It is the use of a computer as an instrument to further illegal ends. Such as committing fraud, trafficking in child pornography, cracking etc
Spam messages
identify source of message
Safe delivery of messages to destination without being accessed by a third party
interpretation of message and digital data
Correct answer is C
Encryption deals with the safe transfer of data of information from its source to its destinations, without a third party having access to the information or data being transferred
1.0
1.5
2.0
2.5
Correct answer is C
Windows 2.0 allowed application windows to overlap each other, unlike its predecessor Windows 1.0, which could display only tiled windows. Windows 2.0 also introduced more sophisticated keyboard-shortcuts and the terminology of "Minimize" and "Maximize", as opposed to "Iconize" and "Zoom" in Windows 1.0. It was also the last version of Windows that did not require a hard disk.
With the improved speed, reliability and usability, computers now started becoming a part of daily life for some workers. Desktop icons and use of keyboard shortcuts helped to speed up work.
An inventory management program can assist with ________
distribution
purchasing
planning
all of the above
Correct answer is D
All of the above
Storage which retains data after power cut off is called
Volatile storage
Non-volatile storage
Sequential storage
Direct storage
Correct answer is B
Non volatile storage retains data after power is off because, Non volatile storage is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short or long term basis