Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Identity Theft Spoofing Hacking Spooling Identity Theft Spoofing Hacking Spooling ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Where would you find a magnetic strip? Smart card Credit card All of these Speakers Smart card Credit card All of these Speakers ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): Hacker-resistant server Encryption safe wall Hacker-proof program Firewall Hacker-resistant server Encryption safe wall Hacker-proof program Firewall ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following can store information in the form of microscopic pits on metal disks. Laser disks None of these Tape cassettes Punched cards RAM cartridge Laser disks None of these Tape cassettes Punched cards RAM cartridge ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Memories which can be read only are called ___ RAM ROM Vertual Memory DRAM RAM ROM Vertual Memory DRAM ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Program execution time would be minimum if the programs are written in High level language Assembly language All of these Machine Language None of these High level language Assembly language All of these Machine Language None of these ANSWER DOWNLOAD EXAMIANS APP