Search
.Management Sciences
A.Entered at different locations where it originates
B.Sent to different locations from a central place
C.Accessed from different places know as distribution points
D.Distributed through a network
Related Mcqs:
- What do you call the programs that are used to find out possible faults and their causes?
- A. operating system extensions B. cookies C. diagnostic software D. boot diskettes...
- Unwanted repetitious messages, such as unsolicited bulk e-mail is known as_________?
- A. Spam B. Trash C. Calibri D. Courier...
- _______________is the ability of a device to “jump” directly to the requested data?
- A. Sequential access B. Random access C. Quick access D. All of the above...
- To access properties of an object, the mouse technique to use is_____________?
- A. Dragging B. dropping C. right-clicking D. shift-clicking...
- Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
- A. Hacker-proof program B. Firewall C. Hacker-resistant server D. Encryption safe wall...
Recent Comments