A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

A. Hacker

B. spammer

C. instant messenger

D. programmer

You can do it
  1. The basic operations performed by a computer are
  2. Which of the following are input devices?
  3. The word length of a computer is measured in
  4. CAD stands for
  5. Operating system, editors, and debuggers comes under?
  6. Which is the limitation of high level language?
  7. Which of the following require large computers memory?
  8. Which of the following machine was not invented by Charles Babbage?
  9. Web cam is an
  10. hat produces useful information out of data?
  11. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
  12. Which type of computers uses the 8-bit code called EBCDIC?
  13. In the IBM PC-At, what do the words AT stand for
  14. The microcomputer, Intel MCS-80 is based on the widely used Intel
  15. The storage subsystem in a microcomputer consists mainly of or media with varying capacities
  16. What does DMA stand for?
  17. The capacity of 3.5 inch floppy disk is
  18. The computer that can input analog signals and return result in digital form
  19. When a computer is switched on, the booting process performs
  20. The BIOS is the abbreviation of .
  21. Which of the following is the largest unit?
  22. What are the computers called that performs calculations and comparisons usually in the binary numbering…
  23. Which of the following is associated with error detector?
  24. The notable features like keyboards, monitors, GUI were developed in
  25. A computer consists of
  26. What was the main disadvantage of vacuum tubes?
  27. The Second Generation Computer was based on .
  28. EBCDIC stands for
  29. An integrated circuit is
  30. The process of transferring files from a computer on the Internet to your computer is called