Home

The common name for the crime of stealing passwords is:

A. Jacking.

B. Identity theft.

C. Spoofing.

D. Hacking.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. When was vacuum tube invented?
  2. Computers with 80286 microprocessor is
  3. The first computers were programmed using
  4. The term gigabyte refers to
  5. Serial access memories are useful in applications where
  6. Which part of the computer is used for calculating and comparing?
  7. John Napier invented Logarithm in
  8. EBCDIC stands for
  9. Artificial Intelligence is associated with which generation?
  10. What was the expected feature of fifth generation computers when Japan started FGCS?
  11. Magnetic disks are the most popular medium for
  12. Which of the following professions has not been affected by personal computers?
  13. A kind of serial dot-matrix printer that forms characters with magnetically-charged ink sprayed dots…
  14. Where as a computer mouse moves over the table surface, the trackball is
  15. Which type of computers uses the 8-bit code called EBCDIC?
  16. The thing that eventually terminates a worm virus is a lack of:
  17. Which of the following is a storage device?
  18. After copying the content how many times can you paste?
  19. Which is the largest computer?
  20. Snowbol is an/a________
  21. CD-ROM is a
  22. The complete picture of data stored in database is known as
  23. The basic operations performed by a computer are
  24. On-line real time systems become popular in ________ generation
  25. Servers are computers that provide resources to other computers connected to a:
  26. Modern Computer are very reliable but they are not
  27. Second generation computers were developed during
  28. Which of the following is a read only memory storage device?
  29. Slide Rules was invented in
  30. Which is valid statement?