ID: #47244 May 24, 2022 Information Technology Download 10th Level/ LDC App The unauthorized changing of data before or after their input to a computer system is called: Ans: Data diddling MALAYALAM GK QUIZ Show Answer « Prev Question Next Question » RELATED QUESTIONS 'Applying thought' is the motto of? മൈക്രോസോഫ്റ്റിന്റെ ആദ്യകാല ആപ്തവാക്യം? Which provides an interface between process and OS? ...... is used as a programming language in first generation computers. ......... is system software that manages computer hardware and software resources and provides common services for computer programs: കമ്പ്യൂട്ടറിന്റെ പ്രാഥമിക ഔട്ട്പുട്ട് യൂണിറ്റ്? Who designed the first electronics computer (ENIAC)? Ethical hackers who use their skill to secure the integrity of computer systems or networks is called? ഇന്റൽ കമ്പനിയുടെ ആസ്ഥാനം? കമ്പ്യൂട്ടറിന്റെ മെമ്മറി എന്നറിയിപ്പടുന്നത്? Cyber laws are included in which list of Indian constitution? EPROM - പൂര്ണ്ണ രൂപം? ആദ്യ മൈക്രോ പ്രൊസസ്സർ? റിച്ചാർഡ് സ്റ്റാൾമാൻ സ്വതന്ത്ര സോഫ്റ്റ് വെയർ പ്രസ്ഥാനം ആരംഭിച്ച വർഷം? Java Script പ്രോഗ്രാമിങ് ലാഗ്വേജിന്റെ ഉപജ്ഞാതാവ്? C-DAC - പൂര്ണ്ണ രൂപം? Internet protocol suite (TCP/IP) was introduced in: Hardware or software designed to prevent unauthorised access to a computer or network from another computer or network is called? BOSS stands for? The difference between people with access to computers and internet and those without is known as: What is the full form of GPU? A single dimensional array is called? India's first cyber cafe was started at: CTRL+P is used for: what is the Storage Area for email messages called? Ctrl+A is a short cut key in keyboard is used for: OLED stand for: വീഡിയോ ഗെയിംസിന്റെ പിതാവ്? SSI യുടെ പൂര്ണ്ണ രൂപം? UNIVAC - പൂര്ണ്ണ രൂപം? Share This Post ↪ Malayalam GK Questions Kerala State Film Awards PSC Malayalam GK Quiz 10th Level Exam Questions Kerala School Text Books 10th Level Exam Syllabus Kerala PSC Notifications Kerala PSC Malayalam Notes