Q.1 Collecting personal information and effectively posing as another individual is known as the crime of:
- Spooling
- Identity theft
- Spoofing
- Hacking
Q.2 The common name for the crime of stealing passwords is:
- Jacking
- Identity theft
- Spoofing
- Hacking
Q.3 The typical computer criminal is a(n):
- Young hacker
- Trusted employee with no criminal record
- Trusted employee with a long, but unknown criminal record
- Overseas young cracker
Q.4 The computer abbreviation KB usually means
- Key Block
- Kernel Boot
- Kilo Byte
- Kit Bit
Q.5 Which of the following is not a storage medium?
- Hard disk
- Flash drive
- DVD
- Scanner
Q.6 In a computer, most processing takes place in
- Memory
- RAM
- Motherboard
- CPU
Q.7 Large transaction processing systems in automated organisations use
- Online processing
- Batch Processing
- Once-a-day Processing
- End-of-day processing
Q.8 A modem is connected to a
- Telephone line
- Keyboard
- Printer
- Monitor
Q.9 Which of the following helps to protect floppy disks from data getting accidentally erased?
- Access notch
- Write-protect notch
- Entry notch
- Input notch
Q.10 Which of the following contains permanent data and gets updated during the processing of transactions?
- Operating System File
- Transaction file
- Software File
- Master file