Question 9 Match the LIST-I with LIST-II LIST-I(Question) LIST-II(Answer) A The speed of a CPU is measured in ____ I Inches B Storage capacity of data […]
Question 8 Which of the following is an independent malicious program that propagates itself across a network by exploiting security flaws in widely-used services? A Computer […]