181. Hardware or software designed to guard against unauthorized access to a computer network is known as a (n):
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
182. The scrambling of code is known as:
A. Encryption
B. A firewall
C. Scrambling
D. Password-proofing
183. If you want to secure a message, use a (n):
A. Cryptology source
B. Encryption key
C. Encryption software package
D. Cryptosystem
184. Instructions and memory address are represented by
A. Character code
B. Binary codes
C. Binary word
D. Parity bit
185. A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
A. Memory
B. Buffer
C. Accumulator
D. Address
186. Which of the following will happen when data is entered into a memory location?
A. It will add to the content of the location.
B. It will change the address of the memory location.
C. It will erase the previous content.
D. It will not be fruitful if there is already some data at the location.
187. The ALU of a computer responds to the commands coming from
A. Primary memory
B. Control section
C. External memory
D. Cache memory
188. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
A. Leech
B. Squid
C. Slug
D. Glitch
189. The vast network of computers that connects millions of people all over the world is called.
A. LAN
B. Web
C. Hypertext
D. Internet
190. Resolution of laser printer is specified in terms of
A. DPI
B. LPM
C. CPM
D. PPM
