Computer Science questions and answers

Computer Science Questions and Answers

Challenge your competence level in computers, computing, algorithms, hardware and software with these Computer science questions and answers.

291.

In order to avoid damages caused by security breaches, the user must?

A.

configure firewall

B.

encourage piracy

C.

install cracked software

D.

promote cyber crime

Correct answer is A

No explanation has been provided for this answer.

292.

Viruses, worms and trojan horses are all? 

A.

application software

B.

malicious software

C.

robust software

D.

system software

Correct answer is B

No explanation has been provided for this answer.

293.

Which of the following statements best describes sequential file organization?

A.

Records are arranged in no particular order

B.

Records are directly addressed to the key value

C.

Records are sorted according to a key field

D.

Records are used as index to access the database

Correct answer is C

No explanation has been provided for this answer.

294.

Which of the following options best shows the arrangement of file structure?   

I File

ll. Field

III. Character

IV, Record

A.

III, II, I and IV

B.

II, III, I and IV

C.

IlI, II, IV and I

D.

II, III, IV and I

Correct answer is A

No explanation has been provided for this answer.

295.

Which of the following is not a criterion files? 

A.

Nature of content

B.

Organizational method

C.

Storage medium

D.

Type of data

Correct answer is C

No explanation has been provided for this answer.