Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Identity Theft Hacking Spoofing Spooling Identity Theft Hacking Spoofing Spooling ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What is the name of the logic circuit which can add two binary digits? Register Half adder Buffer Full adder None of these Register Half adder Buffer Full adder None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Those microcomputers which have the same operating characteristics as the IBM microcomputers are called IBM clones duplicates look alikes None of these copies clones duplicates look alikes None of these copies ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The data bus in 8080A/8085 microprocessor is a group of eight bidirectional lines that are used to transfer 8 bits between the microprocessor and its I/O and memory None of these eight unidirectional lines that are used for I/O devices eight lines used to transfer data among the registers sixteen bidirectional lines that are used for data transfer between the microprocessor and memory eight bidirectional lines that are used to transfer 8 bits between the microprocessor and its I/O and memory None of these eight unidirectional lines that are used for I/O devices eight lines used to transfer data among the registers sixteen bidirectional lines that are used for data transfer between the microprocessor and memory ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Computer memory consists of None of these All of these RAM ROM PROM None of these All of these RAM ROM PROM ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What is the standard code the computer industry created to represent characters? EPROM ASSH DASI ASCII BASCII EPROM ASSH DASI ASCII BASCII ANSWER DOWNLOAD EXAMIANS APP