All of these facts describe time-sharing systems EXCEPT ____.
A. Were developed in the late 1980s
B. Allowed several programs to run concurrently on a single computer
C. Users logged in to the computer via a remote terminal.
D. Still used today in the form of Web and e-mail servers
Answer: A
You might also like to view...
Which of the following is not true about computer crime?
a. Spyware is software that can collect your personal information, monitor your Web surfing habits, and then distribute this information to a third party. b. Identity theft is one of the fastest growing crimes in the United States and the United Kingdom. c. Malware is a general term that describes software designed to damage or infiltrate a computer system without the owner's consent or knowledge. d. In a phishing attack, a "phisher" poses as a legitimate company, like a bank or credit agency, in an e-mail or on a Web site in an attempt to obtain personal information
In Office 2010, the Help button is located on the Ribbon
Indicate whether the statement is true or false