141. Computers manipulate data in many ways, and this manipulation is called......
142. What is the most common tool used to restrict access to a computer system?
143. Switching device of fifth generation computer is--------
144. VOIP stands for..........
145. Which of the following is/ are operating systems
146. A program that performs a useful task while simultaneously allowing destructive acts is a:
147. The typical computer criminal is a(n):
MCQ Multiple Choice Questions and Answers on Computer
Computer Question and Answer