Home

The common name for the crime of stealing passwords is:

A. Jacking.

B. Identity theft.

C. Spoofing.

D. Hacking.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The central processing unit (CPU) consists of
  2. Dot-matrix is a type of
  3. Primary memory stores
  4. The radian of a number system
  5. Storage capacity of magnetic disk depends on
  6. The 2's compliment of a binary no. is obtained by adding________to its 1's compliment.
  7. Which of the following statement is false?
  8. in which year was UKs premier computing event called ?The which computer? started?
  9. Which computer was considered the first electronic computer until 1973 when court invalidated the patent?
  10. Today's computer giant IBM was earlier known by different name which was changes in 1924. What was that…
  11. Which of the following IC was used in third generation of computers?
  12. Which type of computers uses the 8-bit code called EBCDIC?
  13. Which of the following is the 1's complement of 10?
  14. Which of the following programming language started from second generation?
  15. The first machine to successfully perform a long series of arithmetic and logical operations was:
  16. Servers are computers that provide resources to other computers connected to a:
  17. ENIAC uses
  18. Who invented the high level language C?
  19. The output quality of a printer is measured by
  20. Which of the following is not a class based on size?
  21. When was Apple Macintosh II microcomputer introduced in the market?
  22. When a file is saved for the first time
  23. Which statement is valid about computer program?
  24. What was the main disadvantage of vacuum tubes?
  25. ENIAC uses
  26. ________ computers operate essentially by counting
  27. ________are specific to users' needs
  28. Which of the following is not anti-viruses software?
  29. An integrated circuit is
  30. A single packet on a data link is known as