Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Spoofing Spooling Hacking Identity Theft Spoofing Spooling Hacking Identity Theft ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Software instructions intended to satisfy a user's specific processing needs are called _____. Applications software Documentation Systems software A microcomputer All of these Applications software Documentation Systems software A microcomputer All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information How did the computer mouse get its name? Because it squeaks when moved Teeth outside mouth. Its cable looks like a tail. It has ears. Because it squeaks when moved Teeth outside mouth. Its cable looks like a tail. It has ears. ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Locations in the main memory of a computer are called None of these Alphabets Data Words Characters None of these Alphabets Data Words Characters ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The CPU of a computer transfers print output to a temporary disk memory at high speed and then gets back to processing another job without waiting for the output to got to the printer. In this way, the CPU does not remain idle due to its own high speed as compared to the low speed of the printer. What is the name of this memory? ROM None of these Buffer memory I/O memory External memory ROM None of these Buffer memory I/O memory External memory ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which gate sends on a pulse when it receives one at either or both of its terminals. None of these OR NOR NAND NOT None of these OR NOR NAND NOT ANSWER DOWNLOAD EXAMIANS APP