_____________ is process of transferring file from one computer from other using communication medium.
- File encryption
- File transfer
- File copying
- File modification
An illustration of __________is RAM.
- Primary memory
- Secondary memory
- Both A. and B
- None
_______________ is a way computer use to manipulate data.
- processing
- upgrading
- utilizing
- batching
Encoding scheme ASCII provides__________.
- 512 different characters
- 256 different characters
- 128 different characters
- 1024 different characters
__________ is terminology used for illegally stealing password.
- Identity theft.
- Hacking
- Spoofing
Encoding of secretes codes is called ___________.
- firewall
- Encryption
- Password proofing
- Scrambling
MAN is ___________.
- Minimum Area Network
- Maximum Area Network
- Metropolitan Area Network
- Main Area Network
Data is presented in digital signals in __________ computers.
- Digital computer
- Analog computer
- Hybrid Computer
- both
__________is set of instruction that tell computers what operation to be performed.
- structures
- procedural language
- programming language
- natural language
Which of the following memories requires frequent refreshes?
- Dynamic RAM
- Static RAM
- ROM
- EPROM