1. Spyware
2. Adware
3. Spam
4. Malware
5. None of these
Spyware
1. Debugging
2. Compiling
3. Testing
4. Running
5. None of these
Debugging
1. Numeric
2. Required
3. Calculated
4. Validated
5. None of these
Required
1. Boot-sector viruses
2. Macro viruses
3. Time bombs
4. Worms
5. None of these
Worms
1. Open-source
2. Windows
3. Microsoft
4. Mac
5. None of these
Open-source
1. Restoring the information backup
2. An exact copy of a system's information
3. The ability to get a system up a running in the event of a system crash or failure
4. All of these
5. None of these
An exact copy of a system's information
1. Character, file, record, field, database
2. Character, record, field, file, database
3. Character, field, record, file, database
4. Bit, byte, character, record, field, file, database
5. None of these
Bit, byte, character, record, field, file, database
1. A large network of networks
2. An internal communication system for a business
3. A communication system for the Indian government
4. All of these
5. None of these
A large network of networks
1. GUIs
2. Icons
3. Menus
4. Windows
5. None of these
Menus
1. Files may share the same name or the same extension but not both
2. Every file in the same folder must have a unique name
3. File extension is another name for file type
4. The file extension comes before the dot (.) followed by the file name
5. None of these
The file extension comes before the dot (.) followed by the file name