Home
Class 14
GENERAL KNOWLEDGE
A person who used his or her expertise t...

A person who used his or her expertise to gain access to other peoples computer to get information illegally or do damage is

A

Hacker

B

Analyst

C

Instant messenger

D

Programmer

Text Solution

Verified by Experts

The correct Answer is:
A
Promotional Banner

Topper's Solved these Questions

  • BANKING SYSTEM IN INDIA & WORLD

    IBPS & SBI PREVIOUS YEAR PAPER|Exercise MCQs|84 Videos
  • CURRENT AFFAIRS

    IBPS & SBI PREVIOUS YEAR PAPER|Exercise MCQ|304 Videos

Similar Questions

Explore conceptually related problems

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a______.

A person who is addict of alcohol gets his liver destroyed beacuse

A sadist is a person who gets pleasure out of giving pain to others. Given below are some dictionary definitions of certain kinds of persons. Find out the words that fit these descriptions. i. A person who considers it very important that things should be correct or genuine e.g. in the use of language or in the arts: P... ii. A person who believes that war and violence are wrong and will not fight in a war: P... iii. A person who believes that nothing really exists: N... iv. A person who is always hopeful and expects the best in all things: O... v. A person who follows generally accepted norms of behaviour: C... vi. A person who believes that material possessions are all that matter in life: M...

X and Y are type of diseases. X can spread from an infected person to a healthy person by actual contact between them and can spread from an infected person to healthy person with food, air or water. Y remains confined to the person who develops them and do not spread to others. Some examples of X are

X and Y are type of diseases. X can spread from an infected person to a healthy person by actual contact between them and can spread from an infected person to healthy person with food, air or water. Y remains confined to the person who develops them and do not spread to others. Identify X and Y.

Information processing theories are known to break intelligence down into various basic skills that people employ to take in information,process it and then use it to reason and solve problems.Who is best known for propounding such theory?

IBPS & SBI PREVIOUS YEAR PAPER-COMPUTER KNOWLEDGE-MCQs
  1. Finite number of sequential instructions are called

    Text Solution

    |

  2. What is the commonly used unit for measuring the speed of data transmi...

    Text Solution

    |

  3. A person who used his or her expertise to gain access to other peoples...

    Text Solution

    |

  4. A device that connects to a network without the use of cables is said ...

    Text Solution

    |

  5. The most common type of storage devices are

    Text Solution

    |

  6. Compilers used thenumber system to store data and perform calculations

    Text Solution

    |

  7. A DVD is an example of a(n)-

    Text Solution

    |

  8. The enables you to simultaneously keep multiple web pages open in one ...

    Text Solution

    |

  9. Thefolder retains copies of messages that you hae started but are not ...

    Text Solution

    |

  10. A central computer that holds collections of data and program for many...

    Text Solution

    |

  11. What is the process of copying software programs from secondary storag...

    Text Solution

    |

  12. When the pointer is positioned on a , it is shaped like a hand.

    Text Solution

    |

  13. When you save to this, your data will remain intact even when the comp...

    Text Solution

    |

  14. The allows you to access object and start programme.

    Text Solution

    |

  15. Which of the following is an operating system?

    Text Solution

    |

  16. What is correcting errors in a program called?

    Text Solution

    |

  17. What is the other name of LAN card?

    Text Solution

    |

  18. The standard protocol of the internet is.

    Text Solution

    |

  19. Windows 10 is in an example of a.

    Text Solution

    |

  20. Which of the following is machine independent program?

    Text Solution

    |