Jacking.
Identity theft.
Spoofing.
Hacking.
C. Spoofing.
Input device
Output device
Memory
Microprocessor
One bit
Four bits
Eight bits
Sixteen bits
1.40 GB
1.44 MB
1.40 MB
1.44 GB
First Generation
Second Generation
Third Generation
Fourth Generation
arranging
manipulating
calculating
gathering
Basic Input Output System
Best Input Output System
Basic Input Output Symbol
Base Input Output System
Special purpose computers
General purpose computers
Both of above
None of above
Vacuum tubes
Transistors
IC
VLSI
32
116
58
76
Magnetic card
Magnetic tape
Punched card
Optical mark reader
EDSAC
IBM-1401
CDC-1604
ICL-2900
Operating system
Interpreter
Compiler
Assembler
Read-out
Read from
Read
All of above
IBM PCs used RISC CPU designs
Macintosh used CISC CPU design
IBM used CISC CPU design
None of above is true
81
72
71
None of above
Howard Aikin
J. P. Eckert
John Mauchley
John v. Atanasoff
Joystick
Light pen
Mouse
Touch
Mark I
ABC
Z3
None of above
Mainframe
Mini-computer
Microcomputer
PDA
USSR
Japan
USA
UK
arranging
manipulating
calculating
gathering
Binary
Decimal
Hexadecimal
Octal
system software
application software
utility programs
operating system
First
Second
Third
Fourth
Distinct Memory Access
Direct Memory Access
Direct Module Access
Direct Memory Allocation
system software
application software
utility programs
operating system
scanner
camera
plotter
digitizer
First
Second
Third
Fourth
Joystick
Modem
CD Drive
NIC Card
8008
8080
4004
8800