Home

Hackers

A. all have the same motive

B. break into other people's computers

C. may legally break into computers as long as they do not do any damage

D. are people who are allergic to computers

You can do it
  1. A computer assisted method for the recording and analyzing of existing or hypothetical systems is
  2. When was the world's first laptop computer introduced in the market and by whom?
  3. CD-ROM is a
  4. which of the following is problem oriented language?
  5. For which of the following computers can't be used?
  6. The 2's compliment of a binary no. is obtained by adding________to its 1's compliment.
  7. A single packet on a data link is known as
  8. Daisy wheel, Drum, chain etc are the ________
  9. A program that is employed in the development, repair or enhancement of other programs is known as
  10. A modem is connected to
  11. Which statement is valid about computer program?
  12. Which is valid statement?
  13. Which of the following is a way to access secondary memory?
  14. Regarding a VDU, Which statement is more correct?
  15. A name applied by Intel corp. to high speed MOS technology is called
  16. What are the stages in the compilation process?
  17. An application suitable for sequential processing is
  18. How was the generation of computer classified?
  19. RAM is also called as
  20. Why is it unethical to share copyrighted files with your friends?
  21. Integrated Circuits (ICs) are related to which generation of computers?
  22. Which of the following computer implemented binary numbers, perform calculations using electronics and…
  23. What was the nick name of the computer used by the Americans in 1952 for their H-bomb project?
  24. When was Pascaline invented?
  25. Which of the following is first generation of computer?
  26. Which is considered a direct entry input device?
  27. When a logic bomb is activated by a time-related event, it is known as a:
  28. The value of each bead in earth is
  29. The first electronic general purpose digital computer built by Eckert and Mauchly called ENIAC did not…
  30. The Second Generation Computer was based on ________.