MCQs: The common name for the crime of stealing passwords is____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Malicious software is known as____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: In 1999, the Melissa virus was a widely publicised:____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: What type of virus uses computer hosts to reproduce itself?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: The thing that eventually terminates a worm virus is a lack of:
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: When a logic bomb is activated by a time-related event, it is known as a____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: What is the name of an application program that gathers user information and sends it to someone through the Internet?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: ____________is the measurement of things such as fingerprints and retinal scans used for security access?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: What is the most common tool used to restrict access to a computer system?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: The scrambling of code is known as___________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: To prevent the loss of data during power failures, use a(n)_____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: __________is defined as any crime completed through the use of computer technology?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: ___________refers to electronic trespassing or criminal hacking?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: The first electronic computer was developed by____________?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: _____________computers operates essentially by counting?
Category: Computer Science MCQs, Published by: teswesm
|
MCQs: ____________computer is small general purpose micro computer, but larger than portable computer?
Category: Computer Science MCQs, Published by: teswesm
|