Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Spooling Spoofing Hacking Identity Theft Spooling Spoofing Hacking Identity Theft ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information If you see a diskette with a piece of foil covering its notch, it is said to be foil-covered copy-protected write-enabled write-protected None of these foil-covered copy-protected write-enabled write-protected None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A digital device that processes data is known as DBMS Data processor None of these Database Data entry DBMS Data processor None of these Database Data entry ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A floppy disk contains Both circular tracks and sector Sectors only None of these Circular tracks only All of these Both circular tracks and sector Sectors only None of these Circular tracks only All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which is a non-standard version of a computing language? PL/1 PROLOG None of these Army APL PL/1 PROLOG None of these Army APL ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A generalised software package produced to meet the bugs of a variety of data processing users is known as Operating system Application package System software None of these Utility programs Operating system Application package System software None of these Utility programs ANSWER DOWNLOAD EXAMIANS APP