Challenge your competence level in computers, computing, algorithms, hardware and software with these Computer science questions and answers.
Spam messages
identify source of message
Safe delivery of messages to destination without being accessed by a third party
interpretation of message and digital data
Correct answer is C
Encryption deals with the safe transfer of data of information from its source to its destinations, without a third party having access to the information or data being transferred
1.0
1.5
2.0
2.5
Correct answer is C
Windows 2.0 allowed application windows to overlap each other, unlike its predecessor Windows 1.0, which could display only tiled windows. Windows 2.0 also introduced more sophisticated keyboard-shortcuts and the terminology of "Minimize" and "Maximize", as opposed to "Iconize" and "Zoom" in Windows 1.0. It was also the last version of Windows that did not require a hard disk.
With the improved speed, reliability and usability, computers now started becoming a part of daily life for some workers. Desktop icons and use of keyboard shortcuts helped to speed up work.
An inventory management program can assist with ________
distribution
purchasing
planning
all of the above
Correct answer is D
All of the above
Storage which retains data after power cut off is called
Volatile storage
Non-volatile storage
Sequential storage
Direct storage
Correct answer is B
Non volatile storage retains data after power is off because, Non volatile storage is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short or long term basis
Which doesn't belong to the group?
Primary memory
Main memory
External memory
Internal memory
Correct answer is C
External memory doesn't belong to the group because, it is a type of memory that can be detached from the computer unlike the other three options that can't be detected from the computer system because they are inbuilt