1.  Hypermedia

2.  hypertext

3.  HTML

4.  URL

5.  FTP

5
Correct Answer :

hypertext


Explanation :
No Explanation available for this question

1.  Data

2.  cyber

3.  Internet

4.  metaphysical

5.  Publicity

5
Correct Answer :

cyber


Explanation :
No Explanation available for this question

1.  Allhave the same motive

2.  Are people who maintain computers

3.  May legally break into computers as long as the do not do any damage

4.  Are people who are allergic to computers

5.  Break into other people's computers

5
Correct Answer :

Break into other people's computers


Explanation :
No Explanation available for this question

1.  Program thievery

2.  data snatching

3.  Software piracy

4.  program looting

5.  Data looting

5
Correct Answer :

Software piracy


Explanation :
No Explanation available for this question

1.  Spam

2.  spoof

3.  cookie crumbs

4.  sniffer script

5.  Spill

5
Correct Answer :

Spam


Explanation :
No Explanation available for this question

1.  Monitors

2.  Overhead Projections

3.  Monitors and Overhead Projections

4.  Touch Screen Kiosks

5.  Loud Speakers

5
Correct Answer :

Touch Screen Kiosks


Explanation :
No Explanation available for this question

1.  A mouse

2.  A Printer

3.  A Sound format

4.  A Scanner

5.  A Mobile Phone

5
Correct Answer :

A Sound format


Explanation :
No Explanation available for this question

1.  PCs

2.  Minicomputers

3.  Mainframe Computers

4.  WANS

5.  Supercomputers

5
Correct Answer :

PCs


Explanation :
No Explanation available for this question

1.  Speaker

2.  Microphone

3.  Talker

4.  Mouse

5.  Telephone

5
Correct Answer :

Microphone


Explanation :
No Explanation available for this question

1.  Approximately one year

2.  Approximately two years

3.  Approximately five years

4.  Approximately twenty-five years

5.  Almost unlimited

5
Correct Answer :

Approximately five years


Explanation :
No Explanation available for this question

Interview Questions

MongoDB
Java Script
Node JS
PHP
JQuery
Python