The following tools are used for protecting the computer ...
The following tools are used for protecting the computer against virus attack except
Avast anti malware
Kaspersky
Norton
Trojan horse
Correct answer is D
No explanation has been provided for this answer.
When information is conveyed from one space to another, it is referred to as information ...
One advantage of information processing is that ...
While typing a MS word document, Akin inserted footer in the document in order to ...
The design output of a graphic package can be in the following file formats except ...
An entrepreneur who wishes to send digital data over a telephone line would need a ...
The type of data entered into a table in database follow a set of rules known as ...
Microprocessor was used as the main electronic component of the ...
A special effect that controls the way slides appear in PowerPoint presentation is called ...
At what stage in data processing does data manipulation take place? ...