A. Entry codes
B. Passwords
C. Security commands
D. Code words
Related Mcqs:
- In a computer spreadsheet, function which is used to count numbers of entries in given range is called __________ ?
A. Length
B. Counter
C. Count
D. None of TheseSubmitted by: Rashid Mehmood
- A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________?
A. Hacker
B. spammer
C. instant messenger
D. programmer - What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software - Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall - Handheld computer is also called__________?
A. Palmtop computer
B. Laptop computer
C. Notebook computer
D. None of theseSubmitted by: Amna batool
- A single point on a computer screen is called__________?
A. Cell
B. Bit
C. Pixel
D. ElementSubmitted by: Ali Mallah
- _____________is computer software designed to operate the computer hardware and to provide platform for running application software?
A. Application software
B. System software
C. Software
D. None of these - Which part of the computer is directly involved in executing the instructions of the computer program?
A. The scanner
B. The main storage
C. The secondary storage
D. The processor - ____________computer is small general purpose micro computer, but larger than portable computer?
A. Hybrid
B. Digital
C. Desktop
D. Laptop - A program that acts as an intermediary between a user of a computer and the computer hardware:
A. Utility Software
B. Computer Software
C. Operating System
D. Application SoftwareSubmitted by: SUHAIL AHMED KALHORO
The correct answer to the question: "Coded entries which are used to gain access to a computer system are called__________?" is "Passwords".