Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Spoofing Spooling Hacking Identity Theft Spoofing Spooling Hacking Identity Theft ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Pictures or drawings, typically displayed on a VDU to allow users to select program options is called None of these Icons Graphics HIPO charts Network None of these Icons Graphics HIPO charts Network ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information How many symbols exist in Baudot code? 58 116 None of these 76 42 58 116 None of these 76 42 ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify? All of these Surface number Track number Sector number None of these All of these Surface number Track number Sector number None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What Does BIOS Stand For? Better Integrated Operating System Battery Integrated Operating Setup Backup Input Output System Basic Input Output System None of these Better Integrated Operating System Battery Integrated Operating Setup Backup Input Output System Basic Input Output System None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Viruses are called that because They can copy themselves and spread. None of these Both A and B They are viruses They can copy themselves and spread. None of these Both A and B They are viruses ANSWER DOWNLOAD EXAMIANS APP