CS101




---------- was known as “mill” in Analytical engine.
► Memory
Processor
► Monitor
► Mouse

Ref: An arithmetical unit (the "mill") would be able to perform all four arithmetic operations, plus comparisons and optionally square roots. Initially it was conceived as a difference engine curved back upon itself, in a generally circular layout,[2] with the long store exiting off to one side.

First electronic computer was
ABC
► UNVAC 1
► Harvard Mark 1
► IBM PC

What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
Complexity

What happens if I start a new list without closing the original one?
► An error will be generated
A nested list will be created
► Previous list will end and a new will start.
► Nothing will happen

The most upper right pixel of the screen is of ___________ color.
Any
► Red
► Green
► Blue

A single pixel can acquire approximately ___________ color schemes.
► 1 million
► 2 million
► 10 million
16 million

The idea of Neural Networks field is based upon ______________.
► Human nature
Human brain
► Human culture
► Human actions

Which one of the following is an application for artificial intelligence?
► Robotic
► Web Agent
► Decision Support System
All of the given options

Register is a kind of ______memory
Fast
► Super fast
► Slow
► Very slow

Which of the following is a true statement?
► Flat-file storage is better than tabular storage.
Tabular storage is better than flat-file storage.
► Flat-file storage is better than relational storage.
► None of the given options

substring(n, m) returns a string containing characters copied from position n to___________.
► m – 2
m – 1
► m + 1
► m

The __________ is the old profession which is being eliminated because of computing.
Typist
► Bank manager
► Operational manager
► All of the given options

The system that manages relational database, is called ______________.
► None of the given options
► Database Management System
► Data Management System
Relational Database Management System

When web server is busy it gives the following message to the user :
► Time out???
► Waiting
► Server busy
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
Information Technology

_____________ team consists on the sharpest technical minds in the company.
Architecture
► Business Development
► Configuration Management
► Developer

TCP stands for ________.
► Transfer Center protocol
Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► Retrieving
Database
► Information
► DBMS

Microsoft Word is a type of:
► System Software
► Freeware Software
Shrink-Wrapped Software
► Custom-built Software

Users __________, how things work.
► Analyze in detail
Muddle through
► Figure out
► Read in detail

Popular schemes used for reducing bytes for storage are:
► RGB and Color mapping
► RGB and Dithering
► RGB, Color mapping and Dithering
Color mapping and Dithering

Hardware malfunctions is related to
► Data updates
Data integrity
► Data security
► Data accessibility

If incorrectly we enter the negative age it is check by
Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity

Which is the user-friendly way of presenting data ?
► Query
► Form
Report
► All of the given options

Currently the BlueRay DVD can store more than ________ of data.
► 10 GB
► 100 GB
50 GB
► 150 GB

In JavaScript, a || b is interpreted as
► a is true or b is false
► a is true and b is true
► a is false and b is true
a is true or b is true or both are true

Speakers fall into the hardware category.
True
► False

onBlur event is occurred for a form element when it ____________
► Gets focus
Losts focus
► Some thing is typed in
► onBlur is not an event

You can view a 3-D image on a _____________.
► 3-D display
► 2-D display
On both 2-D and 3-D displays
► We can not view a 3-D image

Module level design and unit testing is the responsibility of _____________.
► Team Lead
Developer
► Project Manager
► Quality Assurance Expert

=====================================

Using Java Script you can write a character at random location on screen

► By applying randomCh() method
► With the help of String object
► With the help of random character property
There is no built in approach in Java Script

The Encryption of data is related to
► Data updates
Data security
► Data integrity
► Data accessibility

Which protocol is use to transfer a file over the network ?
► UDP
FTP
► TCP
► OSI

One can send an email message to a remote computer using _______ protocol
► HTTP
SMTP (Page # 173 of Handouts)
► FTP
► TELNET

In a System having many parts to be designed, one should always do the _____ first
Hard part
► Simple part
► Development part
► Quality part

Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
All of the given choices

___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
► Explorer.exe
► System Files
Operating System
► Application Software
Machine language is also called
Assembly Language
► Binary Language??
► High Level Language
► HTML Language

_________ is the best known builder for supercomputers.
► Sun
Cray Research
► Microsoft
► Apple

The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
Pattern recognition & Innovative ideas
► Speed & Storage

Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
Set of rules
► Device

_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.

Support???
► Configuration Management
► Quality Assurance
► Developer

_______________ is responsible for day to day operations.
► CEO
COO (Page # 294)
► CMSO
► Developer

One of the key responsibilities of the ___________ is client relationship management.
Project Manager (Page # 293)
► Team Lead
► Developer
► Quality Assurance Engineer

What is the major problem with flash based website?
Its two heavy
Cannot be indexed
► Less attractive
► Inaccessible

Which of the following is NOT an event handler for image object?
► onAbort
► onError
► onLoad
onUser

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.
► Cooperation
► Shared responsibility
► Networking
All of the given options (Page # 273)

country=”Hello Pakistan”;
document.write(country.charAt(6));

The out put of the above statement is _____________.
► o
P
► a
► k

a = Math.abs(-23)

What will be the value of a ?

► 23
-23
► 23.0
► 2.3

ERP is a type of ______________ .
► Entertainment software
► Productivity software
Business software
► Scientific software

In Genetic Algorithm the most important thing you should know, is the ___________.
► Procedure
Recognition of a good solution
► Different techniques
► None of the given options

According to a popular heuristic, success is defined by ___________.
The user
► The builder
► Both user and builder
► None of the given options

Rule of thumb learned through trial and error is called ___________.
► Design
Heuristic
► Plan
► Aim

Which function returns a randomly selected floating point number between 0 and 1 ?
► floor(x)
► ceil(x)
random()
► round(x)

Functions are also called:
► Heuristics
► Variables
► Arrays
Subprograms

In JavaScript, each element of array can store data of type
► A Number
► An Array
► A String variable
All of the given choices

Processed data is called ________.
Information
► Data
► Entity
► Attribute

Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
Pseudo code & Real code
► Real code & Artificial code
► None of the given options

When we buy a software package, we do not really buy it, we just by a license that allows us to use it, the ___________stays with the maker.
► Agreement
Ownership
► Membership
► Software

Name, Border, Source are the ____________ of the image object.
► Event Handler
Properties
► Methods
► None of the given options

Using smart editors they can automatically color different parts of statements in different colors e.g. HTML tags in ____________ color.
► Green
► Grey
Blue
► None of the given options

____________ is in Executive team.

► Project Manager
CEO
► Team Lead
► Developer

_____________ team is responsible for a project after the specification’s stage till the very end.
► Executive
► Architect
Development
► HR

_____________ waits for some time and then launch a function.
► Timeout( )
setTimeout( )
► setTime( )
► setTimeIn( )

______________ is a field that uniquely identifies each record stored in a table.
► Composite Key
Primary key
► Foreign key
► None of the given options

Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
All of the given options

By default in a web page Hyper Link for another web page is represented as ________________
► Blue only
► Black and Underlined
► Blue and Bold
Blue and Underlined

To store rounded number of 8.6 in a variable called "r_number", we write _____________.
► r_number=Maths.round(8.6)
► r_numbers=Maths.rounds(8.6)
► r_number=Math.rounds(8.6)
r_number=Math.round(8.6)

Which one is the best option for designing a Medical Expert System?
Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network

Variables allow us to manipulate data through the ___________.
► Actual Value
Reference
► Length
► Name

Which is correct?
onUnload
► onUnLoad
► onUNLOAD
► All of the above

Capturing events and responding to them is called __________.
► Function Handling
Event Handling
► Event Procedure
► All of the given option

___________ color should be used in background for a good presentation.
► Light
Dark
► Red
► None of the given options

Which of the following symbol is used for multiple line comments in JavaScript?
► /
► //
/*
► //*

In JavaScript, what will be the result of the follwoing operation

79%3
► 0
1
► 2
► 3

A new cell using HTML is added in table row by
► <TC>…</TC>
► <TR>…</TR>
<TD>…</TD>
► <NC>…</NC>

_________
/////////////
/////////////
------------

It represents the ____________ flow chart element.

► Process
Input or Output
► Decision
► Connector

Vacuum tubes were replaced by ___
► Punch cards
Transistors
► Micro Processors
► Resistors

=================



Which of the following hardware component of a computer can also be called as engine?
► Bus
► Storage
► Memory
Processor

__________ breaks down the message to be sent over the internet into packets.
► FTP
► HTTP
TCP
► IP

A variable can be _________ in scope.
► Local
► Global
Either local or global
► None of the given options

A protocol used for receiving email messages is called ____________.
► URL
► Telnet
POP3
► SMTP

A function is also called __________.
► Sub-program
► Procedure
► Sub-routine
► All of the given option

a = Math.ceil(12.01)
What will be the value of a ?

► 12
13
► 12.0
► 13.01

Event handlers are placed in the ___________ portion of a Web page as attributes in HTML tags.
► HEAD
BODY
► SCRIPT
► TITLE

_________ can be used for entering, editing, or viewing data, one record at a time.
► Queries
Forms
► Reports
► None of the given options

random() function returns a randomly-selected, floating-point number between ____________.
0 and 1
► 0 and 10
► 0 and -10
► 0 and -1

In relational database, data store in the form of _____________.
Tables
► Rows
► Columns
► None of the given options

Spies of one business monitoring the network traffic of their competitors’ ___________.
► Industrial Intelligence
Industrial Espionage
► Industrial Spying
► Industrial Surveillance

_______________ based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy.
► Intranet
Internet
► Home
► LAN

Smart editors can automatically color different parts of statements in different colors e.g. comments in ____________ color.
► Green
Grey
► Blue
► Red

Deep Blue was the name of

computer
► human
► city
► game

Information available on the web is
mostly free of cost
► costly
► very cheap
► of no use

Which one is correct?
► <BODY></BODY>
► <body></body>
Both <BODY></BODY> and <body></body>
► <BODY/>

Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
MS Excel
► MS Access

Blue Pacific is a name of ______ computer.
► Mini
► Desktop
► Micro
Super

_________________ are powerful pieces of hardware, but not much useful on their own.
► Microcontrollers
Microprocessors
► Integrated circuits
► Ports

==========================



URL is a/an ________
► Device
► Component
Address
► Tool

To improve the time for scannig a web page, text should be ___________.
► Centered
Left Aligned
► Right Aligned
► Staggered

Communications on the internet is controlled by a set of two protocols which are ____________.
► IMAP and SMTP
► FTP and HTTP
TCP and IP
► TCP and HTTP

FTP stands for __________.
► File transmission protocol
► File transmission path
File transfer protocol
► Fine transfer path

A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.
► Array
► Function
► Variable
Object

Anchor tag denoted by <A> is used to create
► Address
Hyperlink
► Paragraph
► Title

<UL> tag is used to
► underline text
► end the line
► create ordered list
create unordered list

A user may access any item on the web through __________.
URL
► Telnet
► POP
► SMTP

The browser breaks down the URL into ________ parts.
► 2
3
► 4
► 5

Which one of the following is NOT a primary color?
► Red
► Green
Yellow
► Blue

__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.
► Event called programs
► Event processed programs
Event driven programs
► Event declared programs

Automatic machines performing various tasks that were previously done by humans, are called ____________.
Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents

The distance among families is ___________ because of spending more time on internet.
Increased
► Expanded
► Contracted
► Decreased

The software used for the scanning of internet severs, is called __________.
► Wscan
► Mscan
Sscan
► Vscan

Adding images to html page, we use______ tag.
► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>

The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
All of the given options

When the packets reach at destination, __________ reassembles them into original message.
► Protocol
TCP
► IP
► NIC

In JavaScript, second element of an array has the index:
► 2
► 0
1
► 3
One can download or upload files to a remote computer using ________ protocol.
► HTTP
► SMTP
FTP
► TELNET

JavaScript ________ support drawing of graphics
► Does
Does not
► Always
► At times

Which of the following is NOT true about modern computers?
► More powerful
► Smaller in size
► Consume less energy
Costly

Ada written a computer programme for ?
Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine

A set of stand alone productivity applications designed to work together known as ______________ .
Productivity software suites
► Compiled software
► Secure software
► Intelligent software


RE: CS101 Solved Quiz
Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.
I and II Only
II and III Only
I and III Only
IV Only

Which variables can make the logic of a Web page difficult to understand?
Global
Local
Both Global and Local
None of the given choices

Infection propagation and Actual destructive are the components of _______________
Transmission mechanism
Payload
Worms
Trojan Horse

One of the key responsibility of the ___________is client relationship management
Team Lead
Project Manager
Developer
Chief Executive officer

A method that rounds a number to its nearest integer is:
Math.round( )
Math.Round
Rnd()
Round()

The code in the ______ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate

Program(s) used for writing, sending, receiving, and displaying E-mail messages are:

SMTP server
E-mail client
POP3 server
All of the given choices

JavaScript Arrays are _______________

Homogeneous
Heterogeneous
Homogeneous and Heterogeneous
None of the given choices

Which of the statements is true in context of developing a presentation?

Use simple slide transitions. Too many different transitions are distractive
Use any level of transitions as it doesn’t effect, what you present
Normally text is more preferable than images as they are difficult to perceive
All of the given options

__________ is a collection of data organized in such way that the computer can quickly search for a desired data item.
Select correct option:

Data Base
DBMS
Data Mining
File System

RGB scheme stands for _______________________________.
Select correct option:

Red Grey Blue
Red Green Brown
Red Green Blue
Red Green Black

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type

Number
String
Boolean
None of the given

____________ images enhanced to impart the illusion of depth.
Select correct option:

Parallel
Diagonal
Flat
None of these

___ is a smallest unit of data transmitted over a computer network.
Select correct option:

Frame
Packet
Message
None of the given choices

Yahoo Servers was recovered, from DoS attack, within ___

12 hours
3 hours
24 hours
3 days

Event-driven programs can __________________ events.

capture
respond
capture and respond
None of the Given.

In 1969,DoD-ARPA created an experimental network as a test-bed for emerging networking technologies, the name of this network was:

LAN
ARPA
ARPANET
DoD-ARPA

__________ is a type of computer-to-computer messaging.

TCP
Telnet
E-mail
FTP

In Which topologies, network is not affected if one computer goes down?

Star & Bus
Bus & Ring
Ring & Star
None of the given choices

The greatest, shared resource of information created by humankind is:
Select correct option:

Web
Dictionary
Vocabulary
Glossary

Function definition enclosed in a _____________

pair of curly braces
Pair of parenthesis
Pair of Brackets
All of the Given.

One of the disadvantages of working at home is______________

Contact with the colleagues and the quality of communication is increased, which may result in a poorer quality of work
Contact with the colleagues and the quality of communication is reduced, which may result in a poorer quality of work
Contact with the colleagues and the quality of communication is reduced, which may result in a high quality of work
There is no disadvantage of working at home.


_________ is a field that uniquely identifies each record stored in a table
Select correct option:

Key
Primary Key
Foreign Key
Query

With the Help of FTP we can:

List, change, create folders on a remote computer
Upload and download files
Transferring Web content from the developer’s PC to the Web server
All of the given choices


Table rows are called _________________

Records
Fields
Identifiers
Data

Credit Card Fraud can be minimized by using _______________

single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls

Using ___________ networks access is restricted to authorized computers only.

Public
Private
Both Public & Private
None of the given choices

The solution of the Mail Bombing is ______
Select correct option:

Filtering
Do not accept emails
eMail filtering

JPEG stands for ___________________________________.

Joint Photographic External Group
Journal Photographic Experts Group
Joint Photographic Experts Group
None of these

DBMS stands for ___________.

Data Base Management System
Data Base Mining System
Data Base Merge System
Data Base Manipulation System

The process of converting information about 3-D objects into a bit-map that can be displayed on a 2-D computer display is called _____________________.
Select correct option:

C Rendering
D Rendering
E Rendering
None of these

______________ are used for transferring files between computers on TCP/IP network.

FTP
DNS
Telnet
None of these

The system that manages relational database is called _____

Database Management System
Data Management System
Relational Database Management System
Flat-File System

Unlike viruses, ________________ are stand-alone programs

Trojan horses
Logic- or time-bombs
Worms
None of the given

There are ___________ types communication channels.

2 (correct option) wire and wireless
3
4
5

___________ is the part of the virus that generally consists of malicious computer instructions

Off load
Payload
Loader
Transmitter

The community in which members with common interest share ideas, ask questions, post answers and make announcements through mailing-lists, news groups or message boards is called _____
Select correct option:

Geographical-based community
Interest-based community
Country-based community
City-based community

The Cyberwarefare is a ____

Crime
War
Software
Game

_________ converts computer messages to electrical pulses that are suitable for transmission over the telephone line.

Modulator
Demodulator
Modulator and Demodulator

Which of the following is incorrect for making design elements legible?

Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?

Use color sparingly to to highlight a point, but don't get carried away
Do not use colors like yellow or red for background except where needed.
Do not use colors like green, blue and such like colors except where needed.
None of given options

The output of statement “parseInt ( “3.1526” );” will be:

3
3.1526
3.2
NAN

Tribal Flood Network is a _________

DoS Software
Scanning Software
Arming Software
Network-related

VoIP stands for ___________________________________

Video over Internet Protocol
Visual on Internet Protocol
Voice over Internet Protocol
None of these

MATH functions are accessed by referring to various ______________of the Math object

Functions
Events
Properties
Methods

in motion is called __________________.
Select correct option:

Animation
Screening
Rendering
None of these

Internet is also know as:

LAN
Network
Network of Networks
All of the given choices

There are mainly two types of networks according to network access policy namely :

Public & Commercial
Private & Public
Private & Non- Private
None of the given choices

Internet is an example of ____________ network.

Private
Public
Both Private and Public
None of the given choices

CERN releases WWW in:

1992
1993
1994
None of the given choices

Function definition enclosed in a _____________

pair of curly braces
Pair of parenthesis
Pair of Brackets
All of the Given.

_______________ are harmful in the sense that it can use up available computer resources (i.e. memory, storage, processing), making it slow or even completely useless

Trojan horses
Logic- or time-bombs
Worms
Intrusions

The ____________ is the Advantage of Functions.

Number of lines of code is reduced
Code becomes easier to read & understand
Code becomes easier to maintain as changes need to be made only at a single location instead multiple locations
All of the Given

Normal range of text lines for an effective presentation is:

3 to 7
7 to 10
10-12
May be any number

________ is a network of computer that are lying within the same building or in a vicinity.

LAN
WAN
LAN and WAN
None of the given choices

To stop Industrial Espionage we use_________

Private networks
Encryption
Network sniffers
All of the given

The pattern in which computer are connected together to form a network is called :

Network Topology
Network Transmission
Network Protocol
None of the given choices

____________executes its payload when a predetermined event occurs

Trojan horses
Logic- or time-bombs
Worms
Spyware

One can run a program on a remote computer using the ____________ protocol.

SMTP
TELNET
FTP
None of the given choices

Files can be downloaded or uploaded using ________________ protocol.

SMTP
FTP
TELNET
None of the given choices

________________ are the effective and user-friendly way of presenting summarized data

Forms
Reports
Queries
Tables

Because of the ever-decreasing costs of verbal, text, video communications; the distances have _______

Increased
Expanded
Contracted
Lengthened

______________ are used to view, change and analyze data

Forms
Reports
Queries
Tables

The most common type of Relational database for server is _______________
Select correct option:

Access
Oracle
MySQL
Excel

SMTP stands for _____________________________________.

Simple Mail Transfer Protocol
Simple Mail Transparent Protocol
Simple Mail Transfer Paradigm
None of these

__________ addresses are difficult to recognize and remember for humans.

TCP
IP
SMTP
None of these

Which of the following is termed as a P2P connection ?
Select correct option:

Client-less connection
Server-Oriented connection
Server-less connection
Server-client connection

Whenever a contact in our list comes online, who informs us through an alert message and by playing a sound ?
Select correct option:

IM server
IM client
Client
Server

A hardware device that stores data and programs, executes program instructions, and performs arithmetic/logic operations is known as the ____.
a) CPU
b) Integrated Circuit
c) Main Storage
d) Memory

Viruses move from one computer to another with the ________ and spring into action when the ___________ is executed or opened

Host – Host
Host – Client
Client – Host
Client – Client

In Cyberwarefare __________________.

You attack the enemy
You attack the telecommunication system
You fire missile
All of the given

The first virus that spread world-wide was the ___________ virus.

Brain
Heart
Skull
Soul

What is the 3rd step of DoS attack?

Racy
Arm
Search
Attack

Cyber Crime is possible because of ________

Computer
Networks
Internet
Websites


Which of the following is a meaningful, easy-to-remember ‘label’ for an IP address

Internet
Domain Name
Internet Service Provider
Domain Name System

We use ________ to stop Break-Ins.

Scanners
Intrusion detectors
Firewalls
Intrusion detectors and Firewalls

A stream of large-sized eMails are sent to an address, overloading the destination account is called.
Select correct option:

DoS attack
Break-Ins
Mail Bombing
All of the given

The structure of the networked organization is _______.

Simple
Flexible
Complex
All of the given


In the statement “PopUp(“Message”)” :

“PopUp” is the function Name, “Message” is the argument
“Message” is function identifier
Syntax Error: functions cannot be called in this way
Error: function is undefined

The part of the virus that generally consists of malicious computer instructions is called_____________________

Infection propagation component
Actual destructive component
Payload
Transmitter



The __________ virus may destroy or broadcast private data.

Malicious
Neutral
Helpful
DoS

____________ are an effective, user-friendly way of presenting data.

Reports
Queries
rows
Columns


Images in _______ can be manipulated in many ways using the built-in object Image.

HTML
XML
JavaScript
none of the given

__________has changed our way of life like no other technology.

Computational technology
Computer technology
Computing technology
None of the Above

JavaScript Array can hold elements of __________ simultaneously.

Single data types
Multiple data types
Integers and strings only
Integers and characters only

_____ uses public telecom infrastructure, maintaining privacy through security procedures.

Private Network
Public Network
VPN
None of the given choices

The ________virus may display an annoying, but harmless message

Malicious
Neutral
Helpful
DoS

Bit-map images compresses using the ___________ algorithm.

LZV
LZW
LZE
None of these

Each packet contains the following information

Sender’s address
Data
Error recovery information
None of the given choices

NIC stands for :

Network Interface Card
Network International Card
Network Interface Control
None of the given choices

P.S :
Correct these answers.

Yahoo Servers was recovered, from DoS attack, within ___

12 hours
3 hours
24 hours
3 days

Credit Card Fraud can be minimized by using _______________

single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls

3 comments:

  1. Replies
    1. Virtual University Past Papers: Cs101 >>>>> Download Now

      >>>>> Download Full

      Virtual University Past Papers: Cs101 >>>>> Download LINK

      >>>>> Download Now

      Virtual University Past Papers: Cs101 >>>>> Download Full

      >>>>> Download LINK 7a

      Delete
  2. Download Past papers for all subjects single click
    https://vukwl.blogspot.com/search/label/Past%20Papers

    ReplyDelete