The use of the internet to perform illegal activities is ...
The use of the internet to perform illegal activities is generally called
Cyber crime
Packet sniffing
Phishing
Spamming
Correct answer is A
No explanation has been provided for this answer.
An operating system that enables more than one user to access the same data is called ...
Dust from the system unit casing can be removed using ...
One of the characteristic feature of the second generation computer is the presence of ...
Which of the following data elements ranks highest in size? ...
In word processing applications, the symbol B, I and U are commonly used buttons found on the ...
The following tools are used for protecting the computer against virus attack except ...
When performing computer recovery operations after a system crash, the startup disk is used to ...
Which of the following is not a good computer maintenance practice? ...