Author Archives: Rana Tahir

To access Properties of an object, the mouse technique to use is ?

A. Dragging
B. dropping
C. right-clicking
D. shift-clicking

A Person who used his or her expertise to gain access to other People’s Computers to get information illegally or do damage is a ?

A. Hacker
B. spammer
C. instant messenger
D. programmer

A device that Connects to a network without the use of cables is said to be ?

A. Distributed
B. free
C. centralized
D. none of these

The most Common type of Storage devices are ?

A. magnetic storage
B. Flash memory
C. optical
D. Both A & B

Why is it unethical to share copyrighted files with your friends?

A. It is not unethical, because it is legal.
B. It is unethical because the files are being given for free.
C. Sharing copyrighted files without permission breaks copyright laws.
D. It is not unethical because the files are being given for free.

Codes consisting of lines of varying widths or lengths that are Computer-readable are known as ?

A. an ASCII code
B. a magnetic tape
C. an OCR scanner
D. a bar code

______are used to identify a user who returns to a Website?

A. Cookies
B. Plug-ins
C. Scripts
D. ASPs

The_____ data mining technique derives rules from real-world case examples?

A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning