Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Spooling Hacking Spoofing Identity Theft Spooling Hacking Spoofing Identity Theft ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following is not one of the three primary functions that on-line direct-access systems can serve? None of these inquiry update programming backup None of these inquiry update programming backup ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Hard copy is a term used to describe? All of these Printed output Writing on a hard board Storing information on the hard disk All of these Printed output Writing on a hard board Storing information on the hard disk ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A reflective marker that indicates the end of the usable tape is None of these FAX End-of-tape Optical mark reader End user None of these FAX End-of-tape Optical mark reader End user ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The complete picture of data stored in database is known as None of these Schema DBMS System flowchart Record None of these Schema DBMS System flowchart Record ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What is the name of the visible silver rectangle which separates the take-up portion of the magnetic tape from the data recording portion? Tape marker None of these Load marker Load maker Tape separator Tape marker None of these Load marker Load maker Tape separator ANSWER DOWNLOAD EXAMIANS APP