Computer Science GK- Set 8
201. Which of the following is normally used to initialize a computer system’s hardware? Answer: Random access memory 202. Which is NOT a good Web security strategy? Answer: Removing unnecessary compilers and interpreters 203. The different styles of lettering in a word-processing…