For the following questions answer them individually
To change selected text to all capital letters, click the change case button, then click
A person who used his or her expertise to gain access to other people’s computers to get Information illegally or do damage is a……..
Where you are likely to find an embedded operating system ?
Reusable optical storage will typically have the acronym
An online discussion group that allows direct “live” communication is known as
………..is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.
Which of these is a point and draw device ?
The letter and number of the intersecting column and row is the
A set of rules for telling the computer what operations to perform is called a
A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called —