I want to store the name, address and telephone number of all my friends. What should I use?
I am going to write a letter to my bank. Which piece of software do I need to use
they are usually called hand out to people for advertisment
All of these are advantages of internet banking, except
The survey done by people can be check by
which thing proves that web site is secure
What type of processing is used to process bank cheques?
ATM’s keyboards are used to enter text.
which censor detects the heat and temperature.
internet telephony is also called
Use to check temperature
burglar alarm using which censor
What happens in the Analysis Stage?
Which stage comes after Design?
What happens in the Development and Testing Stage?
User Manuals and Technical guides are created in which stage of the System Analysis and Design?
"I went to a company as a system analyst, sat down to see how the current system works. I did not talk to anyone." Which research method is described above?
"My work is to go through the books of the company I am working for in order to establish what data is inputted into the system." What research method is described above?
"Sometimes, interviews include personal opinions rather than what happens in the organisation." Do you agree?
"While at the supermarket, one of the workers gave me a handout containing questions that I had to answer and return. " Which research method is described above
What is hacking?
Why do people hack to computer system?
What is bio metric authorization
Which method hackers use now a days to hack your account?
Which of these is a physical safety issue?
Where should food and drinks be placed when working on the computer or equipment?
When there is a glare on the computer screen what should the employee do?
You receive an e-mail from a well-known company & the name of the sender is misspell you should...
What does E-Safety mean?
Why should I be careful opening an email attachment from an unknown sender?
There are many microprocessor-controlled devices in the modern home. select three effects of these devices on people's lifestyles.
Select one advantage of video conferencing over a face to face meeting
What does MICR do?
Voice Over Internet protocol (VOIP) is used for what?
Which of the following is NOT malware?
What is the first stage of the systems life cycle?
Phishing generally refers to
User ID and Password should be unique
A ______________ is a software program that is designed to copy itself from one computer to another, without human intervention.