Home

Collecting personal information and effectively posing as another individual is known as the crime of:

A. Spooling.

B. Identity theft.

C. Spoofing.

D. Hacking.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. To prevent the loss of data during power failures, use a(n):
  2. The difference between memory and storage is that memory is ______ and storage is
  3. A compiler means
  4. Floppy disks are available in
  5. Binary circuit elements have
  6. A fault in a computer program which prevents it from working correctly is known as
  7. The term gigabyte refers to
  8. Access time is
  9. Which unit converts computer data into human readable form?
  10. A program component that allows structuring of a program in an unusual way is known as
  11. An intentionally disruptive program that spreads from program to program or from disk to disk is known…
  12. 1 Byte =?
  13. Who designed the first electronics computer ENIAC?
  14. Which of the following statements is true?
  15. Which one of the following is NOT a computer language
  16. In 1999, the Melissa virus was a widely publicised:
  17. The word Abacus is derived from Abax, a word from
  18. Each model of a computer has a unique
  19. The memory which is programmed at the time it is manufactured
  20. The basic operations performed by a computer are
  21. Which of the following is true?
  22. A characteristic of card systems is:
  23. The digital computer was developed primarily in
  24. Which of the following is not processing?
  25. When was the first electro-mechanical computer developed?
  26. Which is a non-standard version of a computing language?
  27. MIS is designed to provide information needed for effective decision making by?
  28. As compared to diskettes, the hard disks are
  29. hat produces useful information out of data?
  30. One computer that is not considered a portable computer is