Data in ___________ format can be easily read and understood.
- graphs
- processed
- presentation
- information
____________ are used to give input to computer.
- input device
- output device
- processing device
- storage device
Which of the following is not example of real security?
- Spam
- Hackers
- Identity theft
- Viruses
A person who illegally broke into others computer to access unauthorized data is called _______.
- spammer
- Hacker
- Programmer
- instant messenger
__________ hold data permanently and get updated during transaction processing.
- Transaction file
- Operating System File
- Master file
- Software File
A _________ is a logic bomb that is set off by a time-related event.
- Virus
- Time-related bomb sequence
- Trojan horse
- Time bomb
___________ computer are enormous in size
- Mainframe
- Micro
- Mini
- Super
Which software is used to format text and data?
- Editors
- MS Word
- MS publisher
- PowerPoint
_____________ is software to create text based documents.
- Suites
- DBMS
- Word processors
- Spreadsheets
Microprocessors can be utilized in making of _________.
- Digital systems
- Calculators
- Computer
- All of the above