Computer Studies Past QuestionsQuestion 251:Running other software on idle computer without the knowledge of the organisation is called theft of ____________ A. Software B. Computer C. Computer time D. Use Question 252:Sensitive data can be protected from prying eyes using ____________ A. File permissions B. File locks C. Passwords D. Encryption Question 253:The number of input combination for a 4 input gate is ____________ A. 9 B. 8 C. 15 D. 16 Question 254:When does the output of a NOR gate =0? A. Whenever 0 is present at input B. Only when all input =0 C. Whenever 1 is present at input D. Only when all input =1. Question 255:A collection of facts and figures is known to be ____________ A. Data B. Database C. Sequenced data D. Structural data |
|
| ||||||
Disclaimer All Views, Names, Acronyms, Trademarks, Expressed on this website are those of their respective owners. Please note that www.schoolngr.com is not affiliated with any of the institutions featured in this website. It is always recommended to visit an institutions or sources official website for more information. In the same vein, all comments placed here do not represent the opinion of schoolngr.com SCHOOLNGR - © 2020 - 2024 - Tayo Hammed | Terms Of Service | Copyright | Privacy Policy |