Computer Basic Information Collecting personal information and effectively posing as another individual is known as the crime of: Hacking Spoofing Spooling Identity Theft Hacking Spoofing Spooling Identity Theft ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following is still useful for adding numbers? UNIVAC Abacus None of these ENIAC EDSAC UNIVAC Abacus None of these ENIAC EDSAC ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Computer scientists are exploring the possibility of culturing bacteria to create living chips which have digital electronic properties. What are these chips called? neural chips natural chips biochips None of these bacterial chips neural chips natural chips biochips None of these bacterial chips ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following isn't used in the storage phase of a computer-based information system? None of these Magnetic Keyboard Diskette Hard disk None of these Magnetic Keyboard Diskette Hard disk ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which was the world's first minicomputer and when was it introduced? PDP-1, 1959 VAX 11/780, 1962 PDP-11 1961 1MB System/36, 1960 None of these PDP-1, 1959 VAX 11/780, 1962 PDP-11 1961 1MB System/36, 1960 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following is not currently a topic in computer science? Multiprocessing Speech recognition None of these Thermodynamics Artificial intelligence Multiprocessing Speech recognition None of these Thermodynamics Artificial intelligence ANSWER DOWNLOAD EXAMIANS APP