A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
Related Mcqs:
- The common name for the crime of stealing passwords is____________?
A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking. - __________is defined as any crime completed through the use of computer technology?
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking - Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
A. Daughter board
B. Motherboard
C. Father board
D. Breadboard - The system unit of a personal computer typically contains all of the following except:
A. Microprocessor
B. Disk controller
C. Serial interface
D. Modem - Which of these is not a means of personal communication on the internet?
A. Chat
B. Instant messaging
C. Insta notes
D. Electronic mail - Word length of a personal computer is _______.
A. 4 bits
B. 8 bits
C. 16 bits
D. 64 bitsSubmitted by: Muhammad Danish
- Who is the father of personal computer?
A. Edward Robert
B. Allen Turing
C. Charles Babbage
D. None of theseSubmitted by: Muhammad Danish
- Keyboard used with personal Computer have___________keys?
A. 84 to 85 keys
B. 101 to 105 keys
C. both a & b
D. none of theseSubmitted by: Muhammad Nawaz
- What was the name of the first personal computer electronic spreadsheet software package which became a smash hit as soon as it was introduced in 1978
A. Word star
B. VisiCalc
C. Lotus 1-2-3
D. ExcelSubmitted by: Anwar
- Which of the following does computing in a personal computer?
A. CPU
B. Motherboard
C. RAM
D. BIOSSubmitted by: Zohaib Hassan
The correct answer to the question: "Collecting personal information and effectively posing as another individual is known as the crime of_____________?" is "Identity theft.".