159901. Which among the following is correct about WRAM?
159902. Compact Disk (CD) is portable disk having data storage capacity between____?
159903. Which among the following is incorrect about CD's features ?
159904. DVD stands for?
159905. Find out the wrong feature of DVD among the following?
159906. Blu Ray Technology was developed by Blu-ray Disc Association with more than ____members?
159907. A database is an organized collection of____?
159908. Which of the following is included in the database collection?
159909. Microsoft Excel is a ________application?
159910. ______was the first technique that posed a serious threat to virus scanners?
159911. A/an ______ is a system susceptibility or flaw?
159912. _______vulnerability is one for which at least one working attack exists?
159913. CVE stands for?
159914. _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication measures without express authorization of the owner of the system, server or network?
159915. ISP refers to?
159916. _____is a computer program that is loaded into a computer without the owner's knowledge?
159917. Which among the following is correct regarding the Boot Sector Viruses?
159918. _______viruses infect executable program files?
159919. _____ infections have cost more money and taken more time to repair than any other virus type?
159920. _____was virus first appeared on Friday, March 26, 1999 and spread all over the world faster than any virus seen before?
159921. 9 Melissa was a _____macro virus?
159922. A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program?
159923. Which among the following is correct about the Antivirus Programs?
159924. Computer crime or Cyber crime is crime that involves?
159925. Net crime is criminal exploitation of the ___?
159926. Crime through Internet includes?
159927. Which among the following is correct about "Hacking"?
159928. Which among the following is correct about "Child Pornography"?
159929. Which among the following characteristics are correct about 'Cyberstalking'?
159930. Denial - of - service attack includes?
159931. Which among the following is wrong characteristic of "Phishing"?
159932. Credit Card Fraud includes?
159933. Punishment for Hacking in Inida is?
159934. Which among the following is best suitable for term "Software Piracy"?
159935. Which among the following are Malicious Softwares?
159936. IRC stands for?
159937. MOD refers to?
159938. INTER POL stands for?
159939. The term Software refers to the set of ________or data a computer processor reads in order to perform a task or operation?
159940. Types of Software includes?
159941. Without software, computers would be ____?
159942. Computer software includes_______and their associated documentation?
159943. In Platform software, Platform includes the?
159944. Software quality is very important especially for commercial and system software like?
159945. Malicious Software is also known as?
159946. _____are computer programs developed to harm and disrupt computers?
159947. _____and extensions are software that extends or modifies the functionality of another piece of software and require that software be used in order to function?
159948. A person who creates software is called a?
159949. Informal term for a programmer is?
159950. Software available for a fee, often inaccurately termed _______which can only be legally used on purchase of a license?