Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Spoofing Identity Theft Hacking Spooling Spoofing Identity Theft Hacking Spooling ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What was the first general - purpose electronic computer ? IBM 405 Zuse Z3 CSIRAC ENIAC IBM 405 Zuse Z3 CSIRAC ENIAC ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information To delete an incorrect character in a document, ______ to erase to the right of the insertion point. Press the left mouse key Double click the right mouse Press the BACKSPACE key Press the delete key Press the left mouse key Double click the right mouse Press the BACKSPACE key Press the delete key ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A wireless network uses .......... waves to transmit signals. None of these Magnetic Radio Sound Mechanical None of these Magnetic Radio Sound Mechanical ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Point out the odd item amongst the following Printer Light pen Computer mouse None of these Touchpad Printer Light pen Computer mouse None of these Touchpad ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What type of control pins are needed in a microprocessor to regulate traffic on the bus, in order to prevent two devices from trying to use it at the same time? Interrupts Bus control Status None of these Bus arbitration Interrupts Bus control Status None of these Bus arbitration ANSWER DOWNLOAD EXAMIANS APP