Search
.Management Sciences
A. edit
B. delete key
C. dummy out
D. trust key
Related Mcqs:
- User datagram protocol is called connectionless because____________________?
- A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. both A and B D. none of these...
- A generalised software package produced to meet the bugs of a variety of data processing users is known as________________?
- A. Application package B. Operating system C. System software D. Utility programs...
- Computer_______________ is whatever is typed, submitted or transmitted to a computer system ?
- A. input B. output C. data D. circuitry...
- The first computer was programmed using_____________________?
- A. Assembly language B. Machine language C. Apaghetti code D. Source code...
- A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is _____________________?
- A. memory only B. write only C. read only D. run only...
Recent Comments