The common name for the crime of stealing passwords is:

A. Jacking.

B. Identity theft.

C. Spoofing.

D. Hacking.

You can do it
  1. What type of virus uses computer hosts to reproduce itself?
  2. Who built the first Mechanical Calculator?
  3. A group of magnetic tapes, videos or terminals usually under the control of one master is
  4. When was the worlds first laptop computer introduced in the market and by whom?
  5. The word processing task associated with changing the appearance of a document is
  6. The brain of any computer system is
  7. Which converts the user data into machine readable form?
  8. High density double sided floppy disks could store _____ of data
  9. in which year was UKs premier computing event called ?The which computer? started?
  10. It was in 2028 BS the was brought in to calculate census datA.
  11. Trackball is A________
  12. In a punched card system, data is processed by a
  13. Mostly which of the following device is used to carry user files?
  14. The first machine to successfully perform a long series of arithmetic and logical operations was:
  15. Which of the following storage device can store the largest amount of data?
  16. Which printer is very commonly used for desktop publishing?
  17. A paper printout of a document is known as
  18. A normal CD-ROM usually can store up to data?
  19. Punched cards were first introduced by
  20. Which is another name for functional language?
  21. On a PC, how much memory is available to application software?
  22. WAN stands for
  23. Excessive parallel processing is related to
  24. A hybrid computer
  25. Who invented Mark I?
  26. BCD is
  27. ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for?
  28. Which of the following is an example of fifth generation computer?
  29. A fault in a computer program which prevents it from working correctly is known as
  30. Which of the following does not store data permanently?