subject

SECTION B (a) Give two most frequent sources of computer virus contaminations. [2] (b) List two (2) things that most people use the general purpose computers for (2] (c) Name two household appliances which are digital in nature. [2] (d) Give three features of a graphical user Interface 131 e) Mention a special location in computer memory (RAM) that temporarily stores data that has peen cut or copied from a document and it's waiting to be pasted. (11give three features of the graphical user interface ​

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:10
Technician a says that if a valve is open when a piston rises to the very top of a cylinder, the piston may actually strike the valve head and cause serious engine damage. technician b says if the camshaft is located in the engine block, then the engine is called an overhead valve engine, ohv engine, or an in-block camshaft. who is right? a. b only b. both a and b c. a only d. neither a nor b
Answers: 3
question
Computers and Technology, 22.06.2019 11:30
Hassan is writing his master’s thesis, which is a thirty-page document. he received some feedback from his professor in the form of comments, but does not see where the comments are. what is the fastest way for hassan to find the feedback?
Answers: 3
question
Computers and Technology, 23.06.2019 11:30
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
question
Computers and Technology, 23.06.2019 21:30
Examine the list below. which factors positively affect lifetime income? check all that apply.
Answers: 1
You know the right answer?
SECTION B (a) Give two most frequent sources of computer virus contaminations. [2] (b) List two (2)...
Questions
question
Mathematics, 06.05.2020 07:23
Questions on the website: 13722363