Computer Series 14 November 27, 2020wefru 10 Created on November 27, 2020 By wefru Computer Series 14 TEST YOUR SKILLS BRODLY 1 / 10 Q141. Computers manipulate data in many ways, and this manipulation is called...... upgrading processing batching utilizing 2 / 10 142. The ability to recover and read deleted or damaged files from a criminal's computer isan example of a law enforcement speciality called: robotics simulation computer forensics animation 3 / 10 Q143. Where does most data go first with in a computer memory hierarchy ? RAM ROM BIOS CACHE 4 / 10 Q144. The………….data mining technique derives rules from real-world case examples. Rule discover Signal processing Neural nets Case-based reasoning 5 / 10 Q145. …………….are used to identify a user who returns to a Website Cookies Plug-ins Scripts ASPs 6 / 10 Q146. Codes consisting of lines of varying widths or lengths that are computer-readable areknown as- an ASCII code a magnetic tape an OCR scanner a bar code 7 / 10 Q147. Why is it unethical to share copyrighted files with your friends? It is not unethical, because it is legal. It is unethical because the files are being given for free Sharing copyrighted files without permission breaks copyright laws It is not unethical because the files are being given for free. 8 / 10 148. Reusable optical storage will typically have the acronym- CD DVD ROM RW 9 / 10 Q149. The most common type of storage devices are- Steel optical magnetic flash 10 / 10 150. A device that connects to a network without the use of cables is said to be- Distributed free centralized none of these Your score isThe average score is 65% LinkedIn Facebook Twitter VKontakte 0% Restart quiz