161. What is backup ?
(1) Adding more components to your network (2) Protectiong data by copying it from the original source to a different destination (3) Filtering old. data from the new data (4) Accessing data on tape (5) Using earlier data
162. The legal right to use software based on specific restrictions is granted via a..........
(1) software privacy policy (2) software license (3) software password manager (4) software log (5) None of these
163. What is an E-mail attachment?
(1) A receipt sent by the recipient (2) A separate document from another program sent along with an E-mail message (3) A malicious parasite that feeds off of your messages and destroys the contents
(4) A list of CC : or BCC : recipients (5) A friend to whom E-mail is sent regularly
164. The type of software that controls - the Internal operations in the computer, and controls how the computer works with all Its parts is which of the following ?
(1) Shareware (2) Public domain software (3) Application software (4) Operating system software (5) None of these
165. When data changes In multiple lists and all lists are not updated, this causes ...........
(1) Data redundancy (2) Information overload (3) Duplicate data (4) Data consistency (5) Data inconsistency
166. What Is the main folder on a storage device called ?
(1) Root directory (2) Interface (3) Device drive/
(4) Platform (5) Main directory
167. To view information on the web you must have a..........
(1) Cable modem (2) Web browser (3) Domain Name Server (4) Hypertext viewer (5) None of these
168. A file is often referred to as a(n)
(1) Wizard (2) Document (3) Pane (4) Device (5) Documentation
169. To protect yourself from' computer hacker intrusions you shoud install a .............
(1) Firewall (2) Mailer (3) Macro (4) Script
(5) None of these
170. What type of computers are client computers (most of