Computer Past Questions And Answers
441
The following actions are sources of breaches in computing except?
- A. carelessness
- B. hackers' threat.
- C. piracy.
- D. viruses.
442
Evaluate 100112 - 11112
- A. 000102
- B. 001002
- C. 010002
- D. 100002
443
''....For the Son of man also came not to be served but to serve, and to give his life as a ransom for many.'' This statement was made by Jesus
- A. after healing two blind men near Jericho
- B. immediately before He told the parable of the householder
- C. during the discussion that followed the request by the sons of Zebedee
- D. as He was foretelling His crucifixion and resurrection
444
A half byte is known as ________.
- A. data
- B. bit
- C. half byte
- D. nibble
445
QBASIC keywords do not include?
- A. FIND B.
- B. LET C.
- C. REM D.
- D. STOP.
446
In a Windows operation involving dragging and dropping an item on the desktop, the item will be?
- A. deleted from the screen.
- B. duplicated.
- C. moved to a new location.
- D. renamed.
447
Which of these commands will reboot the computer ?
- A. Ctrl + Alt + Del
- B. Ctrl + Del
- C. Ctrl + Alt + C
- D. Ctrl + Alt
448
CRACKING comes under ___________
- A. website service
- B. transcription
- C. computer crime
- D. data security
449
Which of the following statements is true about super computers? They
- A. can fit on a single small chip
- B. are easily affordable
- C. can process billions of operations in a second
- D. are found across various homes and offices
450
The computer memory is, measured in?
- A. bit
- B. byte
- C. hertz
- D. nibble

