Challenge your competence level in computers, computing, algorithms, hardware and software with these Computer science questions and answers.
In order to avoid damages caused by security breaches, the user must?
configure firewall
encourage piracy
install cracked software
promote cyber crime
Correct answer is A
No explanation has been provided for this answer.
Viruses, worms and trojan horses are all?
application software
malicious software
robust software
system software
Correct answer is B
No explanation has been provided for this answer.
Which of the following statements best describes sequential file organization?
Records are arranged in no particular order
Records are directly addressed to the key value
Records are sorted according to a key field
Records are used as index to access the database
Correct answer is C
No explanation has been provided for this answer.
III, II, I and IV
II, III, I and IV
IlI, II, IV and I
II, III, IV and I
Correct answer is A
No explanation has been provided for this answer.
Which of the following is not a criterion files?
Nature of content
Organizational method
Storage medium
Type of data
Correct answer is C
No explanation has been provided for this answer.