_________ is an office software that is used for designing...
______ is an illegal act of accessing the computer resources of some...
Which of the following is true about Computer Aided Instruction?
Aircraft engineers, developers, and designers use _________ to design,...
_________ is an act of attacking the mission-critical information...
____________ is when someone uses your identify by stealing and using...
_________ is a type of program that is used to spy, track, monitor...
Doctors use ___________ scans to see cross-sectional slices of human...
A cookie is a program that runs in a webserver and asks your web...
What is ATM?
_________ is a type of office software used to type reports and memos.
The software that is used for workgroups is _______.
Pedro's modus is to act as if he withdraws in an ATM Machine. He...
____________ is about designing an ultra-tiny chips and electrical...
___________ is an application in schools that allows students to learn...
Check as many as you can in the choices below that say true about...
A Spam collects and records secretly resources from your computer.
Spam usually offers products or services that we want and need.
The manager uses __________ to help them in planning, directing,...
A hacker employs a technique known as ___________ where he tries to...
Check as many as you can that is true about Computer Viruses.
Which of the following are types of viruses?
_________________ is the office of the future in which magnetic and...
In medicine, which of the following are the uses of computers?
_________ is the first step to good computer security.
Check as many as you can that say true about MS-Excel.
In __________, photons can travel on optical fibers or thin films to...
Computers can also be used for education. The software used for this...
It is a future technology that uses embedded protons which remain...
Which of the following are true about an antivirus?
Users using a groupware that works simultaneously even they are not in...
Spyware is a type of unsolicited email that enters your inbox.
With ___________, a new class of multi-user software, the users can...
Which of the following are true about Cyber Crime?
Which of the following are different uses of computers in banks?
Which of the following is true about an antivirus?
A __________ is anything that can cause harm to your computer...
Anna received an email informing her that she is one of the few...
Which of the following holds true about a paperless office?
In a factory, which of the following are applications of computers?
Which of the following is True about Threats?
Which of the following are the uses of computers in TV and Movies?
Anna received an email informing her that she won a lottery in the...
A firewall is another tool to countermeasure Threats in your computer...