Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Hacking Spoofing Spooling Identity Theft Hacking Spoofing Spooling Identity Theft ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A data item which is not broken down into smaller units is _____ None of these Database management Data entry Data element Elementary data item None of these Database management Data entry Data element Elementary data item ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information CPU controls ___ None of the listed here Controlled by the input data All input, output and processing. Controls Memory None of the listed here Controlled by the input data All input, output and processing. Controls Memory ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Superscript, subscript, outline, emboss, engrave are known as ....... None of these Font Effects Font Styles Text Effects Word Art None of these Font Effects Font Styles Text Effects Word Art ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following best describes a computer-based information system? Processing data A system in which a computer is used to turn data into information Inputting data Performing complex mathematical calculations Data is put into the computer for processing Processing data A system in which a computer is used to turn data into information Inputting data Performing complex mathematical calculations Data is put into the computer for processing ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information In case of MS-WORD, which of the following is not available in Font Spacing? Expanded Condensed None of these Normal Loosely Expanded Condensed None of these Normal Loosely ANSWER DOWNLOAD EXAMIANS APP