Junk e-mail is also called

A. spam

B. spoof

C. sniffer script

D. spool

You can do it
  1. Which unit converts user data into machine readable form?
  2. Second Generation computers were developed during
  3. How many address lines are needed to address each machine location in a 2048 x 4 memory chip?
  4. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
  5. Which of the following memory medium is not used as main memory system?
  6. Which of the following can store information in the form of microscopic pits on metal disks.
  7. Which of the following helps to protect floppy disks from data getting accidentally erased?
  8. The brain of any computer system is
  9. Different components of the motherboard of a PC unit are linked together by sets of parallel electrical…
  10. A path by which communication is achieved between a central processor and other devices is called
  11. A factor which would strongly influence a business person to adopt a computer is its
  12. Registers, which are partially visible to users and used to hold conditional, are known as
  13. The first electronic computer was developed by
  14. Which of the following is not a feature of first generation computers
  15. which of the following is problem oriented language?
  16. ________ are used for plotting graphs and design on papers
  17. CD-ROM stands for
  18. Collecting personal information and effectively posing as another individual is known as the crime of:
  19. Which of the following is the first computer to use Stored Program Concept?
  20. All of the following are examples of storage devices EXCEPT:
  21. The main electronic component used in first generation computers was
  22. EEPROM stands for
  23. The BIOS is the abbreviation of .
  24. A storage area used to store data to a compensate for the difference in speed at which the different…
  25. Which is the type of memory for information that does not change on your computer?
  26. A small or intelligent device is so called because it contains within it a
  27. What difference does the 5th generation computer have from other generation computers?
  28. Which of the following statement is false?
  29. Which device is used to backup the data?
  30. Before a disk drive can access any sector record, a computer program has to provide the records disk…