Which of the following is the proper removal of any malicious program from a computer system?
1). Reconfiguration
2). Reboot
3). Restart
4). Uninstallation
1. How many bits does an IP address contain?
2. What is the main folder on a storage device called ?
3. ASP in computer science stands for?
4. Where are you likely to find an embedded operating system ?
5. The software that is used to create text-based documents are referred to as
6. In computer terminology, what is the full form of FTP?
8. Which programming language is developed by James A Gosling?
9. _________ performs tasks such as inserting, updating, or deleting data occurrences.
10. What is it called when computer connects to other computer and sends information?