___________ is when someone steals another persons identity.
Cyber bullying
Identity Theft
Identity Phase
Cyber Know How
Correct answer is B
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964
What is the etiquette one should follow while working online?
Anything goes . . . providing he/she remains anonymous
Netflix
Netiquette
Piracy
Correct answer is C
Netiquette, which is a portmanteau of "net" and "etiquette," refers to using courtesy and politeness when communicating with others online
An Operating System is a type of?
Application Software
System software
Utility Program
None of these
Correct answer is B
An operating system (OS) is a system software that manages computer hardware, software resources, and provides common services for computer programs
What does an Operating System do?
Memory Management
File Management
Application Management
All of the above
Correct answer is D
Operating System (OS) is a program that manages a computer's resources, especially the allocation of those resources among other programs. Typical resources include the central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections
What is the permanent memory built into your computer called?
RAM
ROM
CPU
CD-ROM
Correct answer is B
ROM is an acronym for Read-Only Memory. It refers to computer memory chips containing permanent or semi-permanent data. Unlike RAM, ROM is non-volatile; even after you turn off your computer, the contents of ROM will remain. Almost every computer comes with a small amount of ROM containing the boot firmware