Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Spoofing Identity Theft Hacking Spooling Spoofing Identity Theft Hacking Spooling ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A type of instruction that can produce several lines of machine language code is a Mnemonic None of these assemble Macro Address Mnemonic None of these assemble Macro Address ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What was the name of the first stored program electronic computer which was built in 1949 at Cambridge University in England? EDVAC None of these UNIVAC MARK-I EDSAC EDVAC None of these UNIVAC MARK-I EDSAC ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The original ASCII code used _____ bits of each byte, reserving that last bit for error checking. 5 4 7 6 8 5 4 7 6 8 ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The process of copying data from a memory location is called Writing Reading Booting Controlling Writing Reading Booting Controlling ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A CPU's processing power is measured in: nano-seconds IPS None of these CIPS MIPS nano-seconds IPS None of these CIPS MIPS ANSWER DOWNLOAD EXAMIANS APP