Computer Series 14

Created on By 52fd849a905aedf0249df9e69d61b55a?s=32&d=mm&r=gwefru

Computer Series 14


1 / 10

Q141. Computers manipulate data in many ways, and this manipulation is called......

2 / 10

142. The ability to recover and read deleted or damaged files from a criminal's computer is
an example of a law enforcement speciality called:

3 / 10

Q143. Where does most data go first with in a computer memory hierarchy ?

4 / 10

Q144. The………….data mining technique derives rules from real-world case examples.

5 / 10

Q145. …………….are used to identify a user who returns to a Website

6 / 10

Q146. Codes consisting of lines of varying widths or lengths that are computer-readable are
known as-

7 / 10

Q147. Why is it unethical to share copyrighted files with your friends?

8 / 10

148. Reusable optical storage will typically have the acronym-

9 / 10

Q149. The most common type of storage devices are-

10 / 10

150. A device that connects to a network without the use of cables is said to be-

Your score is

The average score is 65%


Leave a Reply

Your email address will not be published. Required fields are marked *