Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Identity Theft Spoofing Hacking Spooling Identity Theft Spoofing Hacking Spooling ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A program that performs a useful task while simultaneously allowing destructive acts is: Worm Macro Virus Trojan Horse Virus Worm Macro Virus Trojan Horse Virus ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What is the name of the earliest calculating machine which was based on concepts found in modern computers but was unfortunately never built? Pascal's Adder Differential Analyser None of these Leibnitz's Multiplier Babbage's Difference Engine Pascal's Adder Differential Analyser None of these Leibnitz's Multiplier Babbage's Difference Engine ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information An Integrated Circuit (IC) is An integrating device Much costlier than a single transistor None of these A complicated circuit Fabricated on a tiny silicon chip An integrating device Much costlier than a single transistor None of these A complicated circuit Fabricated on a tiny silicon chip ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which facilitates data processing capabilities at the location of the end-user. DTP FAX DDP EDT None of these DTP FAX DDP EDT None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The unit of a computer system that executes program, communicates with and often controls the operation of other subsystems of the computer is known as I/O unit Peripheral unit None of these Control Unit CPU I/O unit Peripheral unit None of these Control Unit CPU ANSWER DOWNLOAD EXAMIANS APP