Serah Chimanga
This page lists questions and answers that were posted by visitors named Serah Chimanga.
Questions
The following questions were asked by visitors named Serah Chimanga.
Malware
2 years ago
Types of photosynthesis
2 years ago
What is photosystem
2 years ago
What should a user do when a computer is not responding to commands Press Ctrl+ arrow Switch it to another user Switch it on and off Plug it in and out
2 years ago
A computer that processes individually distinct discrete data of 0's and 1's that can be counted is....... Analog computer Hybrid computer Batch system Digital computer
2 years ago
Why is the width of the data bus so important to the processing speed of a computer
2 years ago
Which one of the following may generally mean hardware ? Word processor Program Operating system Firmware
2 years ago
Which menu/submenu includes the command 'find'?
2 years ago
Which of the following is not an internet search engine Yahoo Google Zoom MSN
2 years ago
I/0 memory
2 years ago
Answers
The following answers were posted by visitors named Serah Chimanga.
Membrane transportation
2 years ago
What does it takes for photosynthesis to occur
2 years ago
Photosystem
2 years ago
Photosystem 1
2 years ago
Photosystem 2
2 years ago
Anuthorised way of gaining access to a computer system without authority is called
2 years ago
A computer performance can become slow because of Running several application software at the same time Printing document at a low resolution
2 years ago
A communication between computers using standard telephone service
2 years ago
The ability of a computer to handle more than one task at a go is called
2 years ago
Which of the following tasks is best suited to a spread sheet program Typing a standard letter Presenting information to a large audience Typing and reserving airline tickets Calculating sales data for a new project
2 years ago
A customer complains that they received a malicious E-mails from the same user several times a day , what should you ask the customer?
2 years ago
External memory
2 years ago
ROM
2 years ago
Buffer memory
2 years ago
Malware
2 years ago
Reference from the above notes
2 years ago