A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus
A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.
A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
A. Key Block
B. Kernel Boot
C. Kilo Byte
D. Kit Bit
A. Hard disk
B. Flash drive
C. DVD
D. scanner
A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing
A. a telephone line
B. a keyboard
C. a printer
D. a monitor
A. Operating System File
B. Transaction file
C. Software File
D. Master file