Computer

Q111

Any crime using computer technology is called___________?

Q112

To prevent data loss during power failure use a(n)_____________?

Q114

Hardware/software that protects networks is called a(n)___________?

Q115

Most common tool used to restrict access is____________?

Q116

Measurement of fingerprints and retinal scans is called___________?

Q117

A program that gathers user information and sends it through the Internet is called:

Q118

When a logic bomb is activated by time, it is known as a____________?

Q119

The thing that eventually terminates a worm virus is a lack of:

Scroll to Top