A. Hacker
B. spammer
C. instant messenger
D. programmer
Related Mcqs:
- What type of computers are client computers (most of the time) in a client-server system?
A. Mainframe
B. Mini-computer
C. Microcomputer
D. PDA - Servers are computers that provide resources to other computers connected to a___________?
A. Network
B. Mainframe
C. Supercomputer
D. Client - _____ computers are also called personal computers.
A. Super Computers
B. Mini Computers
C. Micro Computers
D. Mainframe ComputersSubmitted by: Muhammad Danish
- Coded entries which are used to gain access to a computer system are called__________?
A. Entry codes
B. Passwords
C. Security commands
D. Code words - Computers process data into information by working exclusively with____________?
A. multimedia
B. word
C. numbers
D. characters - When a logic bomb is activated by a time-related event, it is known as a____________?
A. Time-related bomb sequence.
B. Virus.
C. Time bomb.
D. Trojan horse. - The keyboard F12 key in Ms Word opens a____________?
A. Save As dialog box
B. Open dialog box
C. Save dialog box
D. Close dialog box - Serial access memories are useful in applications where:
A. Data consists of numbers
B. Short access time is required
C. Each stored word is processed differently
D. Data naturally needs to flow in and out in serial form - A______________is a collection of data organized in a manner that allows access, retrieval and use of that data.
A. File
B. Recordset
C. Database
D. documentSubmitted by: Amna batool
- From where you can access Save command in Microsoft Word?
A. Home tab
B. Insert tab
C. Review tab
D. None of above
The correct answer to the question: "A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________?" is "Hacker".