_______________ is the method involving creating written or generated codes that allow information to be kept secret.
(A) Debugging
(B) Programming
(C) Cryptography
(D) Open Sourcing
(E) Data Mining
Verification of a login name and password is known as_____.
(A) Configuration
(B) Accessibility
(C) Authentication
(D) logging in
(E) None of these
Verification process of confirming identity for allowing access to a computer system is called
(A) Login
(B) Signup
(C) Spooling
(D) Authentication
Expand RDBMS.
(A) Relative Database Management System
(B) Rational Database Minimize System
(C) Relational Database Management System
(D) Relational Database Maximize System
(E) None of these
When installing a peripheral you also usually need to install a________.
(A) server
(B) port
(C) driver
(D) password
(E) none of these
Which part of the computer is directly invoked in executing the instructions of the computer program?
(A) main storage
(B) secondary storage
(C) printer
(D) processor
(E) scanner
The Fifth generation computing device, based on _____.
(A) artificial intelligence
(B) very large scale integration (VLSI)
(C) both of above
(D) SQL
(E) None of these
White Box testing, a software testing technique is sometimes called ______.
(A) Basic path
(B) Graph testing
(C) Data flow
(D) Glass box testing
(E) None of these
What is the built-in permanent memory in a computer called?
(A) RAM
(B) ROM
(C) CPU
(D) CD-ROM
Which of the following system components is the brain of a computer?
(A) Circuit board
(B) CPU
(C) Memory
(D) Network card
Get the Examsbook Prep App Today