A) Read of Memory
B) Random Memory
C) Read only Memory
D) Random Memory
Computer Science
DOS cannot retrieve any data from a disk if a computer virus corrupts its:
A) BAT Files
B) Data Area
C) Directory Area
D) File Allocation Table (FAT)
In MS Excel the intersection of columns and rows is called a:
A) Data
B) Table
C) Information
D) Cell
What is unsolicited bulk e-mail known as?
A) Hebrew
B) Spool
C) Roman Times
D) Spam
The smallest memory unit of computer is:
A) Kilobyte
B) Byte
C) Terabyte
D) Bit
Which of the following is the most powerful computer?
A) Mobile Computer
B) Super Computer
C) Power Computer
D) None of these
In computer science, Half – byte is also known as:
A) Four bits
B) Word
C) None of above
D) Nibble
Clicking on the formula bar is a method of entering data EXCEPT:
A) Pressing Enter
B) Pressing the Esc key
C) Clicking on the formula bar
D) None of these
The first Network is called:
A) NETSET
B) ARPANET
C) CNNET
D) NERP
Which of the following is not a major reason for an email bounce?
A) Gabon
B) Maldives
C) Indonesia
D) All of these