A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus
0
Malicious software is known as____________?
0
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware
0
The common name for the crime of stealing passwords is____________?
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
0
The typical computer criminal is a(n)____________?
A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.
0
The computer abbreviation KB usually means____________?
A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
0
Which of the following is not a storage medium?
A. Key Block
B. Kernel Boot
C. Kilo Byte
D. Kit Bit
1
Large transaction processing systems in automated organisations use___________?
A. Hard disk
B. Flash drive
C. DVD
D. scanner
0
A modem is connected to_____________?
A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing
0
Which of the following contains permanent data and gets updated during the processing of transactions?
A. a telephone line
B. a keyboard
C. a printer
D. a monitor
Download App