Home

The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

A. robotics

B. simulation

C. computer forensics

D. animation

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. A number which is stored and processed but not in the standard exponential form is called
  2. Which of the items below are considered removable storage media?
  3. A technique used by codes to convert an analog signal into a digital bit stream is known as
  4. Who used punched cards practically for the first time in the history of computers?
  5. Second Generation computers were developed during
  6. Which part of the computer is directly involved in executing the instructions of the computer program?
  7. Registers which are partially visible to users and used to hold conditional codes (bits set by the CPU…
  8. The first electronic general purpose digital computer built by Eckert and Mauchly called ENIAC did not…
  9. Once you load the suitable program and provide required data, computer does not need human intervention.…
  10. A pen shaped device which can sense light, and is used to point at spots on a video screen.
  11. Which of the following is not a micro computer?
  12. Which is the highest form?
  13. A hard copy would be prepared on a
  14. A Compiler is
  15. Nepal brought a computer for census of 2028 BS. This computer was of
  16. Which 8-bit chip was used in many of today's TRS-80 computers?
  17. Which device is required for the Internet connection?
  18. Which of the following is correct acronym of VGA?
  19. The advantage of COM are its and
  20. Magnetic disk is an example of
  21. The system unit of a personal computer typically contains all of the following except:
  22. EBCDIC stands for
  23. Which of the following are the cheapest memory devices in terms of Cost/Bit?
  24. Which is not a comptuer of first generation?
  25. Which is a unit representing the no bits of discrete.
  26. Which of the following is internal memory?
  27. An index register that is automatically incremented or decremented with each use is
  28. What are the three decisions making operations performed by the ALU of a computer?
  29. The translator program used in assembly language is called
  30. Hardware or software designed to guard against unauthorized access to a computer network is known as…