________ refers to electronic trespassing or criminal hacking.

A. Cracking

B. Jacking

C. Spoofing

D. Smarming

You can do it yup
  1. A logic bomb that was created to erupt on Michelangelos birthday is an example of a:
  2. ________ is the science that attempts to produce machines that display the same type of Intelligence…
  3. Which of the following are the best units of data on an external storage device?
  4. Why is it unethical to share copyrighted files with your friends?
  5. Can you tell what passes into and out from the computer via its ports?
  6. Raw facts and figures about any particular topic are
  7. Which of the following produces the best quality graphics reproduction?
  8. UNIVAC is
  9. An example of a digital device can be
  10. Memory unit is one part of
  11. The Second Generation Computer was based on ________.
  12. Which printer is very commonly used for desktop publishing?
  13. The amount of vertical space between lines of text in a document is called
  14. In latest generation computers, the instructions are executed
  15. How many address lines are needed to address each machine location in a 2048 x 4 memory chip?
  16. Excessive parallel processing is related to
  17. Software in computer
  18. Junk e-mail is also called
  19. A paper printout of a document is known as
  20. Algorithm and Flow chart help us to
  21. A computer program that converts an entire program into machine language is called a/an
  22. Which of the following is not processing?
  23. What is the other name for programmed chip?
  24. Instructions and memory address are represented by
  25. Who invented Integrated Circuits?
  26. A name applied by Intel corp. to high speed MOS technology is called
  27. Storage capacity of magnetic disk depends on
  28. What does the disk drive of a computer do?
  29. What is the date when Babbage conceived Analytical engine
  30. The symbols used in an assembly language are