Which of these are NOT types of computer hackers?
Internet____________ is the protection of personal data published on a the internet.
Which of the following is NOT a type of cybercrime?
Which technology is used in compact discs?
The ___ is a set of rules which computers use to communicate with each other across a network.
Computers are fast, accurate, reliable and provide huge capacity of storing data only. This statement is ___.
If electrical power supply to a computer system is suddenly disrupted, serious damage would occur to ___.
Each specific piece of information in a table called a____________.
Which of the following is a picture that is saved on a diskette and can be pasted into a document?
In MS Access database objects appear as_____________.