Question 1 Report
The following actions are sources of breaches in computing except?
Answer Details
Which of the following statements are true about computer? I.Constructed from electronic components. II. It has self regeneration capability. III. It has fac...
A personnel who deals with the computer and its management is called?
The map of Nigeria is an example of ?
An input device that converts an image into text is known as?
The Slide Rule is accurate to?
Computers are classified using the following criteria except?
The hexadecimal number 13, expressed as a binary here is?
Modern computers compared to earlier computers are?
Everything you need to excel in JAMB, WAEC & NECO