Computer

Q31

Large transaction processing systems in automated organisations use___________?

Q34

The typical computer criminal is a(n)____________?

Q35

The common name for the crime of stealing passwords is____________?

Q36

Collecting personal information and posing as another individual is known as_____________?

Q38

A program that performs a useful task while allowing destructive acts is a___________?

Q39

An intentionally disruptive program that spreads is known as a_____________?

Q40

In 1999, the Melissa virus was a widely publicised:____________?

Scroll to Top