Home
Class 14
GENERAL KNOWLEDGE
To protect yourself from computer hacker...

To protect yourself from computer hacker intrusions you should install a________

A

Firewall

B

mailer

C

Macro

D

Script

Text Solution

Verified by Experts

The correct Answer is:
A
Promotional Banner

Topper's Solved these Questions

  • BANKING SYSTEM IN INDIA & WORLD

    IBPS & SBI PREVIOUS YEAR PAPER|Exercise MCQs|84 Videos
  • CURRENT AFFAIRS

    IBPS & SBI PREVIOUS YEAR PAPER|Exercise MCQ|304 Videos
IBPS & SBI PREVIOUS YEAR PAPER-COMPUTER KNOWLEDGE-MCQs
  1. To view information on the web you must have a

    Text Solution

    |

  2. A file is often referred to as a(n)

    Text Solution

    |

  3. To protect yourself from computer hacker intrusions you should install...

    Text Solution

    |

  4. What type of computers are client computers (most of the time) in a cl...

    Text Solution

    |

  5. What happens when you boot up a PC?

    Text Solution

    |

  6. Linux is an example of

    Text Solution

    |

  7. Which of the following software applications would be the most appropr...

    Text Solution

    |

  8. Ais used to read handwritten or printed text to make a digial image th...

    Text Solution

    |

  9. You organize files by storing them in

    Text Solution

    |

  10. Apre-designed document that already has coordinating fonts, a layout, ...

    Text Solution

    |

  11. What is the default file extension for all word documents?

    Text Solution

    |

  12. Removing and replacing devices without turning off your computer is re...

    Text Solution

    |

  13. Specialized programs that assist users in locating information on the ...

    Text Solution

    |

  14. Compiling creates a(n)

    Text Solution

    |

  15. Expansion cards are inserted into

    Text Solution

    |

  16. A device that connects to a network without the use of cables is said ...

    Text Solution

    |

  17. A complete electronic circuit with transistors and other electronic co...

    Text Solution

    |

  18. Junk e-mail is also called

    Text Solution

    |

  19. A program designed to destroy data on your computer which can travel t...

    Text Solution

    |

  20. shows the files, folders, and drives on your computer, making it easy ...

    Text Solution

    |