________ refers to electronic trespassing or criminal hacking.

A. Cracking

B. Jacking

C. Spoofing

D. Smarming

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Operating system, editors, and debuggers comes under?
  2. Web cam is an
  3. Which of the following is first generation computer?
  4. A digital computer did not score over an analog computer in terms of
  5. The process of communicating with a file from a terminal is
  6. The two kinds of main memory are:
  7. Regarding data, computers are very good at
  8. The technology that stores only the essential instructions on a microprocessor chip and thus enhances…
  9. Access time is
  10. SMPS stands for
  11. Who invented EDSAC?
  12. Which of the following programming language started from second generation?
  13. Which of the following is not anti-viruses software?
  14. Which device is required for the Internet connection?
  15. In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted…
  16. A set of rods where numbers were carved and used for multiplication and division aids is known as
  17. Second Generation computers were developed during
  18. Which American computer company is called Big Blue?
  19. Which of the following helps to protect floppy disks from data getting accidentally erased?
  20. The personal computer industry was started by
  21. The value of each bead in earth is
  22. Which of the following is/ are operating systems
  23. Which statement is valid about computer program?
  24. What is the main difference between a mainframe and a super computer?
  25. A kind of serial dot-matrix printer that forms characters with magnetically-charged ink sprayed dots…
  26. Snowbol is an/a________
  27. A paper printout of a document is known as
  28. What is a light pen?
  29. First generation computers used _________ for memory
  30. Computers process data into information by working exclusively with :