Home / Computer MCQs / Question
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Q. The phrase ____ describes viruses, worms, Trojan horse attack applets and attack scripts.
Q. Main protocol used in Internet
Q. The ____ takes on different shapes depending on the task you are performing.
Q. Which of the following is suitable after you install new drivers?
Q. Which functionin Excel checks whether a condition is true or not ?
Q. A hacker contacts your phone or E-mails and attempts to acquire your password is called
Q. Which of the following can input graphical images and pictures for a computer?
Q. Which of the following is not likely to be a symptop of virus in a computer
Discusssion
Login to discuss.