English

Q722

Large transaction processing systems in automated organisations use___________?

Q725

The typical computer criminal is a(n)____________?

Q726

The common name for the crime of stealing passwords is____________?

Q727

Collecting personal information and effectively posing as another individual is known as the crime of_____________?

Q729

A program that performs a useful task while simultaneously allowing destructive acts is a___________?

Q730

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?

Scroll to Top