Home

________is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. IBM System/360 is
  2. A logic bomb that was created to erupt on Michelangelos birthday is an example of a:
  3. Which of the following memory medium is not used as main memory system?
  4. What is an interpreter?
  5. A ________ is a microprocessor -based computing device.
  6. Which of the following is required when more than one person uses a central computer at the same time?
  7. Which of the following is associated with error detector?
  8. Which unit converts user data into machine readable form?
  9. Which of the following is internal memory?
  10. To prevent the loss of data during power failures, use a(n):
  11. Slide Rules was invented in
  12. Hardware or software designed to guard against unauthorized access to a computer network is known as…
  13. In a computer, most processing takes place in
  14. Which statement is valid about computer program?
  15. Which is a semi conductor memory?
  16. A computer program that converts an entire program into machine language is called a/an
  17. The brain of any computer system is
  18. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
  19. High level language is also called
  20. Which of the following is not a type of Software?
  21. FORTRAN is
  22. Which of the following terms is the most closely related to main memory?
  23. Where does most data go first with in a computer memory hierarchy?
  24. Which one of the following is NOT a computer language
  25. The first electronic computer was developed by
  26. What type of computers are client computers (most of the time) in a client-server system?
  27. The advantage of COM are its __ and __
  28. Most important advantage of an IC is its
  29. After copying the content how many times can you paste?
  30. Computer operators