A. all have the same motive
B. break into other people’s computers
C. may legally break into computers as long as they do not do any damage
D. are people who are allergic to computers
Related Mcqs:
- Which statement is valid about computer program?
A. High level languages must be converted into machine language to execute
B. High level language programs are more efficient and faster to execute
C. It is more difficult to identify errors in high level language program than in low level programs
D. All of above - Identify the true statement about computer.
A. Computers are 100% accurate but it can suffer from GIGO (Garbage In Garbage Out)
B. Computers are reliable because they use electronic component which have very low failure rate
C. Computer is never tired and does not suffer from boredom
D. All of above - Which of the following statement is false in Microsoft Word?
A. You can set different header and footer for last page of a section
B. You can set different header footer for even and odd pages
C. You can set different page number formats for different sections
D. You can set different header footer for first page of a section - Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
A. Daughter board
B. Motherboard
C. Father board
D. Breadboard - The primary function of the__________is to set up the hardware and load and start an operating system?
A. System Programs
B. BIOS
C. CP
D. Memory - The_____________data mining technique derives rules from real-world case examples?
A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning - The thing that eventually terminates a worm virus is a lack of:
A. Memory or disk space.
B. Time.
C. CD drives space.
D. CD-RW. - Computers, combine both measuring and counting, are called________________?
A. Analog
B. Digital
C. Hybrid
D. All of these - When was the first IBM microcomputer called IBM with 16-bit microprocessor introduced?
A. 1979
B. 1981
C. 1982
D. 1984Submitted by: Anwar
- What is the function of a firewall in computer networking?
A. Monitor website traffic
B. Block unwanted email
C. Protect against unauthorized access and threats
D. Increase internet speedSubmitted by: Zafar Ullah
The correct answer to the question: "which statement describe “Hackers”?" is "break into other people’s computers".