Which of the following is a temporary file that can be used only once and then discarded?
Sorting of records is sufficient and a necessary condition for creating?
The illegal copying and use of proprietary/copy righted software is called?
Symptoms of computer virus attack include:
I improved processing speeds; Il drive light coming up without apparent reason; Ill unexplainable printer activity; IV the disappearance or strange files appearance on the screen
(a) (i) What is a network cable?
(ii) State three types of cable used in networking
(b) Write the acronym VSAT in full.
(C) (i) Distinguish between an e-mail address and a website address.
(ii) List examples of each of: (1) e-mail address (2) website address