Most computer crime are committed by
a) hackers
b) international spies
c) highly paid computer consultants
d) none of these
What does DoS stand for in hacking term
a) disk operating system
b) denial of service
c) disk of service
d) denial of system
A person who gains illegal access to computer system is called……
a) hacker
b) worm
c) software pirate
d) none of these
Which of the following software are examples of cyber patrol and net nanny?
a) blocking
b) CSS
c) PICA
d) none of these
The ACM code for ethics is geared primarily to…….
a) computer professional
b) computer users
c) administrator
d) both a & b
What major issues separates the computing haves from the have nots?
a) digital divide
b) healthy computing
c) ergonomics
d) green computing