Information Technology Questions
Q. Unsolicited commercial email is commonly known as:
View SolutionQ. What is the full form of ATM?
View SolutionQ. The criminal reads or copies confidential or proprietary information,but the data is neither deleted nor changed- This is termed:
View SolutionQ. Who is regarded as the father of WiFi?
View SolutionQ. The component of a computer system with the circuitry to control in interpretation and execution of instructions is known as:
View SolutionQ. Most of the commonly used personal computers/ laptops do not have a command key known as:
View SolutionQ. Control Bus is-
View SolutionQ. The ____ is the box that houses the most important parts of a computer system?
View SolutionQ. The activity of creating sectors and tracks on a hard disk is called?
View SolutionQ. An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing:
View SolutionGet Question Bank
Strengthen Your Practice with our comprehensive question bank.