Computer Quiz 6

Welcome to your Computer Quiz 6

Name
1. 
_______ is used to prevent unauthorized interceptors from assessing telecommunications?

2. 
In which of the following states the transaction execute all its operation successfully and all the effects are now permanently saved on the database system?

3. 
The short statement that represent that steps that the computer system needs to follow to solve a problem are called?

4. 
f you see a small red triangle in the top right corner of a cell, it means there is something attached to the call. What is it________

5. 
In binary coded decimal systems the decimal number 81 is represented as?

6. 
___ is standard for how to specify a document markup language or tag set?

7. 
What is RISC__________

8. 
An E-mail protocol for storage, management and change, especially in corporate offices__________

9. 
stacks and queues are example of?

10. 
BISYNC is an abbreviation for________

11. 
Single-word reference to viruses, worms etc is_________

12. 
You can protect sensitive data from prying eyes using____

13. 
Petya was______ that attacked many computer systems.

14. 
Narrow band channel is a communication channels_________

15. 
NORTON‘ is an_________

16. 
___ is imperative language and___ is declarative language?

17. 
A process of trying out a new product by independent users before it is finally manufactured/developed__________

18. 
Which file starts MS Word___________

19. 
What is the keyboard shortcut for creating a chart from the selected cells________

20. 
Android version 7 is called_______.

Leave a Comment

error: Content is protected !!