English

Q821

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?

Q822

A program that performs a useful task while simultaneously allowing destructive acts is a___________?

Q824

Collecting personal information and effectively posing as another individual is known as the crime of_____________?

Q825

The common name for the crime of stealing passwords is____________?

Q826

The typical computer criminal is a(n)____________?

Q829

Large transaction processing systems in automated organisations use___________?

Scroll to Top