A. Steal sensitive data.
B. Provide remote control for an attacker to use an infected machine.
C. Investigate the infected user’s local network.
D. All of the above
Explanation
میلویئر حملہ آور کو متاثرہ مشین استعمال کرنے کے لیے ریموٹ کنٹرول فراہم کرتا ہے۔
میلویئر متاثرہ صارف کے مقامی نیٹ ورک کی چھان بین کرتا ہے۔
میلویئر حساس ڈیٹا چوری کرتا ہے۔
Show/Hide Explanation
A. Both
B. Primary
C. Secondary
D. None
Explanation
Read-only memory is a type of non-volatile memory used in computers and other electronic devices.
Data stored in ROM cannot be electronically modified after the manufacture of the memory device.
Show/Hide Explanation
A. write
B. read
C. None
D. read and write
Explanation
RAM and ROM difference
Show/Hide Explanation
A. None
B. Both
C. data
D. instructions
Explanation
There are two types of storage devices used with computers: a primary storage device, such as RAM, and a secondary storage device, such as a hard drive.
Show/Hide Explanation
A. None
B. encryption
C. description
D. storing
Explanation
In cryptography, encryption is the process of encoding information.
This process converts the original representation of the information, known as plain text , into an alternative form known as cipher text .
Show/Hide Explanation
A. Hard disk
B. printers
C. Floppy disk
D. All
Explanation
Types of Printers
Laser Printers.
Solid Ink Printers.
LED Printers.
Business Inkjet Printers.
Home Inkjet Printers.
Multi function Printers.
Dot Matrix Printers.
3D Printers.
Show/Hide Explanation
A. Pascal
B. All
C. Van Tessel
D. Seymour Cray
Explanation
Supercomputers were introduced in the 1960s, and for several decades the fastest were made by Seymour Cray at Control Data Corporation .
A supercomputer is a computer with a high level of performance compared to a general-purpose computer.
Show/Hide Explanation
وہ سافٹ ویئر جو ایک پیکج کو بڑھاتے ہیں کیا کہلاتے ہیں
A. Vertical Integration
B. DOS
C. Horizontal Integration
D. Operating System
Explanation
The vertical integration of software is all about improving the functionality of your software by dividing your overall software system up into subsystems and then integrating those subsystems together according to the functions that they perform.
Show/Hide Explanation
A. Small message send
B. Short message service
C. Send message send.
D. None
Explanation
SMS stands for Short message service;
SMS, is a text messaging service component of most telephone, Internet, and mobile device systems.
SMS was defined in 1986 as part of the Global System for Mobile Communications (GSM)
The first SMS message was sent on 3 December 1992
ND04-12-2022
Show/Hide Explanation
A. media access control
B. none
C. multi access control
D. media access capital
Explanation
A media access control is a network data transfer policy that determines how data is transmitted between two computer terminals through a network cable.
Show/Hide Explanation
✅ Correct: 0 |
❌ Wrong: 0 |
📊 Total Attempted: 0