___________ are ciphered entries that are used to log into a computer system.
- Passwords
- Entry codes
- Code words
- Security commands
Junk Emails are known as________?
- spoof
- spam
- spool
- sniffer script
_____________ is not antivirus software.
- Kaspersky
- Avira
- McAfee
- Oracle
________ generation computer were very big in size.
- Second Generation
- First Generation
- Fourth Generation
- Third Generation
____________ is circuit board where all chips are mounted.
- Motherboard
- Daughter board
- Breadboard
- Father board
__________ convert high level language program into machine language line by line.
- Interpreter
- Compiler
- Loader
- Linker
What is the name of the group of system programs that manages and coordinates a computer system’s overall operations?
- Operating system
- System software
- Device driver
- Utility program
ALU stands for ____________?
- Array Logic Unit
- Application Logic Unit
- Arithmetic Logic Unit
- None of above
Files can be arranged by storing in __________?
- folders
- archives
- lists
- indexes
In a client-server system, what kind of computers is considered clients?
- Mini-computer
- Mainframe
- PDA
- Microcomputer