Answer: It opens Clip Art taskbarSol. Insert >> Picture >> Clip Art series of action opens clip art taskbar.
Answer: It opens Clip Art taskbarSol. Insert >> Picture >> Clip Art series of action opens clip art taskbar.
Answer: A method of moving items on a slideSol. Motion path is a method of moving items on a slide.
Answer: Solving computing problems by breaking them into smaller parts that are separately processed by different computersSol. Distributed processing is a phrase used to refer to a variety of computer systems that use more than one computer (or processor) to run an application. This includes parallel processing in which a single computer uses more than one CPU to execute programs.
Answer: Howard AikenSol. MARK-1 invented was by Howard Aiken.
Answer: Interface Message ProcessorSol. The very first device that had fundamentally the same functionality as a router does today was the Interface Message Processor (IMP); IMPs were the devices that made up the ARPANET, the first TCP/IP network.
Answer: JDBCSol. Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.
Answer: IMAP version 4Sol. IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
Answer: AdwareSol. Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
Answer:JudySol. Recently nearly 41 Android apps, developed by Korea-based Kiniwini and published under the moniker ENISTUDIO Corp., set into motion fraudulent activities on the devices they were downloaded on. Judy malware infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it.
Answer: Public, privateSol. Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called the private key.
Answer: HacktivismSol. Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist. In contrast to a malicious hacker who hacks a computer with the intent to steal private information or cause other harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes.
Answer: CreeperSol. Creeper virus is a computer virus that is most commonly recognized as the first computer virus
Answer: GIF ImageSol. The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.
Answer: Ultraviolet rays are used to erase the data stored in the memorySol. Erasable Programmable Read-Only Memory (EPROM) is a type of ROM from which the stored data can be erased using ultraviolet rays.
Answer: Slide Sorter ViewSol. Normal View is used for editing a presentation slide by slide. Outline view is used to edit and jump between slides. Slide Sorter View is used to view thumbnail versions of all the sliders collectively. Notes Page View is used to view the look of the presentation when printed with notes.
Answer: PersonalizeSol. Wallpapers can be changed by the personalize section of all control panel items.
.
Answer: Mnemonic
Answer: Tianhe-2
Answer: CMOSSol. The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the on board battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy. Additionally, the system clock resets when the CMOS loses power.