Home

What is the most common tool used to restrict access to a computer system?

A. User logins

B. Passwords

C. Computer keys

D. Access-control software

You can do it
  1. Which of the following is not an output device?
  2. A PHP Error was encountered

    Severity: Notice

    Message: iconv_strlen(): Detected an illegal character in input string

    Filename: compat/mbstring.php

    Line Number: 77

    Backtrace:

    File: /var/www/html/application/views/discuss.php
    Line: 226
    Function: character_limiter

    File: /var/www/html/application/helpers/viewloader_helper.php
    Line: 1359
    Function: view

    File: /var/www/html/application/controllers/Questions.php
    Line: 484
    Function: load_guest

    File: /var/www/html/index.php
    Line: 315
    Function: require_once

    Who is the inventor of Difference Engine?
  3. What is a light pen?
  4. Web cam is an
  5. Trackball is A________
  6. IBM System/360 is
  7. Each set of Napier's bones consisted of rods.
  8. Which of the following is valid statement?
  9. Collecting personal information and effectively posing as another individual is known as the crime of:
  10. UNIVAC is
  11. Which was the most popular first generation computer?
  12. The word processing task associated with changing the appearance of a document is
  13. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
  14. The original ASCII code used__bits of each byte, reserving that last bit for error checking
  15. Magnetic disks are the most popular medium for
  16. What is meant by a dedicated computer?
  17. The computer code for the interchange of information between terminals is
  18. Which computer has been designed to be as compact as possible?
  19. UNIVAC is
  20. Floppy disks typically in diameter
  21. Which part of the computer is used for calculating and comparing?
  22. ALU is
  23. Which unit converts user data into machine readable form?
  24. The advantage of COM are its __ and __
  25. A song being played on computer speaker is
  26. Which generation of computer is still under development
  27. How many numbers could ENIAC store in its internal memory
  28. Charles Babbage was awarded by Royal Society for his
  29. The actual execution of instructions happens in
  30. The term GIGO is related to