Collecting personal information and effectively posing as another individual is known as the crime of_____________?
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
The common name for the crime of stealing passwords is____________?
A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.
The typical computer criminal is a(n)____________?
A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
The computer abbreviation KB usually means____________?
A. Key Block
B. Kernel Boot
C. Kilo Byte
D. Kit Bit
Which of the following is not a storage medium?
A. Hard disk
B. Flash drive
C. DVD
D. scanner
Large transaction processing systems in automated organisations use___________?
A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing
A modem is connected to_____________?
A. a telephone line
B. a keyboard
C. a printer
D. a monitor
Which of the following contains permanent data and gets updated during the processing of transactions?
A. Operating System File
B. Transaction file
C. Software File
D. Master file
A. Megabyte
B. Gigabyte
C. Terabyte
D. None of these
The smallest unit of data in a computer is called Bit (Binary Digit). A bit has a single binary value, either 0 or 1. In most computer systems, there are eight bits in a byte. among the following: Megabyte is the smallest.
Which of the following does not store data permanently?
A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk