Computer

Q371

Collecting personal information and posing as another individual is known as_____________?

Q372

The common name for the crime of stealing passwords is____________?

Q373

The typical computer criminal is a(n)____________?

Q376

Large transaction processing systems in automated organisations use___________?

Q378

Which of the following contains permanent data and gets updated during the processing of transactions?

Scroll to Top