A. Computer viruses
B. Phishing trips
C. Phishing scams
D. Spyware scams
Submitted by: Malik Asghar Hussain
Related Mcqs:
- ______________is the science that attempts to produce machines that display the same type of intelligence that humans do?
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (Al) - MIS is designed to provide information needed for effective decision making by?
A. Consumers
B. Workers
C. Foremen
D. Managers - You use a(n)___________such as a keyboard or mouse, to input information?
A. output device
B. input device
C. storage device
D. processing device - A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________?
A. Hacker
B. spammer
C. instant messenger
D. programmer - Collecting personal information and effectively posing as another individual is known as the crime of_____________?
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking. - In Power Point Speaker’s information is expressed in___________?
A. Nav Panel
B. Notes
C. Speaker’s Panel
D. Both B. and C.Submitted by: Muhammad Husnain Naseer
- Which protocol is used to automatically assign TCP/IP configuration information?
A. DNS
B. DHCP
C. NetBIOS
D. NetLinkSubmitted by: Hassan Syed
- Temporary storage place for information in a computer is called:
A. Back Up
B. Buffer
C. Binary file
D. Data recorderSubmitted by: Mahmood Ul Hussan
- In microsoft Window 7, __________ can give you information about weather?
A. File
B. Gadgets
C. Window explorer
D. Both A and BSubmitted by: Farhan Rana
- __________maintain (s) database of webpages containing information on variety of topics.
A. Newsgroup
B. News server
C. Search EnginesĀ
D. World wide webSubmitted by: Farhan Rana