The illegal access to a network or computer system is____...
The illegal access to a network or computer system is___________
security
cracking
virus
piracy
Correct answer is B
Cracking is trying to get into computer systems in order to steal, corrupt or illegitimately view data
A tier in which the database resides along with the query processing language is called ...
Which of the following is an example of output device ...
A similarity between data and information is that both? ...
The copyright law is used to protect? ...
Computer applications are example of ___________ ...
The uses of spreadsheet packages include: 1. -Preparing organisation's logo; II. - ...
_________ are programmes that affect the effectiveness of a computer system ...
A collection of facts and figures is known to be _________ ...
Which of the following is not a method of accessing file? ...