Question
Section 66F deals
with:ÂSolution
Section 66F defines cyber terrorism, including acts threatening sovereignty, integrity, and security of India through computer resources.
Which memory type is generally used as a buffer between the CPU and main memory to improve performance?
It is connected between a telephone line and computer is called
What does DNS stand for in networking?
A program that works like a calculator for keeping track of money and making budgetsÂ
In web search, finding a large number of documents with very little relevant information is termed:
In Excel intersection of a row and column is called:
Expansion cards are inserted into
Which key is used as a shortcut to rename a folder in Windows 8 or higher versions? Â
First Super Computer developed in India was _____
Computer uses the_________number system to store data and perform calculations.