A. Entry codesB. PasswordsC. Security commandsD. Code words
Read More »Combination of hardware and software that facilitates the sharing of information between computing devices is called?
A. NetworkB. PeripheralC. Expansion boardD. Digital device
Read More »The first computers were programmed using?
A. Assembly languageB. Machine languageC. Source codeD. Object code
Read More »Who has been called the world’s first Lady computer programmer?
A. Ada LovelaceB. Allegra ByronC. Lady AugustaD. Allegra Noel-Byron
Read More »A number system that has eight different symbols to represent any quantity is known as?
A. BinaryB. OctalC. DecimalD. Hexadecimal
Read More »Ctrl, Shift and Alt are called keys.
A. AlphanumericB. FunctionC. ModifierD. All of Above
Read More »Microsoft Office is an example of a?
A. Horizontal market softwareB. Open source softwareC. Vertical market softwareD. Closed source software
Read More »In which graphics, digital photos and scanned images are typically stored with extensions such as.bmp, .png, .jpg, .tif or.gif?
A. BitmapB. PixelsC. Both Bitmap and PixelsD. Plane
Read More »In IT, associative memory is called as?
A. Virtual memoryB. Cache memoryC. Content Addressable MemoryD. Main memory
Read More »In Ms Excel, which of the following special function keys allow the content in cell?
A. ShiftB. EscC. TabD. Space
Read More »