Home

________is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

You can do it yup
  1. The two major types of computer chips are
  2. The average time necessary for the correct sector of a disk to arrive at the read write head is _____
  3. Charles Babbage is considered the father of modern computers because
  4. Personal computers used a number of chips mounted on a main circuit board. What is the common name for…
  5. An output device that uses words or messages recorded on a magnetic medium to produce audio response…
  6. Which of the following is a read only memory storage device?
  7. In a computer _____ is capable to store single binary bit.
  8. A technique used by codes to convert an analog signal into a digital bit stream is known as
  9. The computer that can input analog signals and return result in digital form
  10. Which of the following is not processing?
  11. Which of the following is first generation of computer?
  12. The ________ data mining technique derives rules from real-world case examples.
  13. A computer program that translates one program instructions at a time into machine language is called…
  14. The arranging of data in a logical sequence is called
  15. Regarding a VDU, Which statement is more correct?
  16. All modern computer operate on
  17. A digital computer did not score over an analog computer in terms of
  18. Junk e-mail is also called
  19. The accuracy of the floating-point numbers representable in two 16-bit words of a computer is approximately
  20. What type of computers are client computers (most of the time) in a client-server system?
  21. A modern electronic computer is a machine that is meant for
  22. DOS stands for
  23. From which generation operating systems were developed?
  24. Which of the following is used only for data entry and storage, and never for processing?
  25. Which is the largest computer?
  26. In what respect human beings are superior to computers?
  27. ________ is the key we use to run the selected command.
  28. What is the responsibility of the logical unit in the CPU of a computer?
  29. Which of the following is not anti-viruses software?
  30. Which is the first electronic digital computer?