A. Hybrid
B. Digital
C. Desktop
D. Laptop
A. Portable computer
B. Hybrid computer
C. Analog computer
D. Digital computer
A. J.V. Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf
A. Cracking
B. Jacking
C. Spoofing
D. Smarming
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
A. Encryption program
B. Surge protector
C. Firewall
D. UPS
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery