Computer ______ is a complex consisting of two or more connected computing units, it is used for the
A.storage B.device C.network D.processor
A.storage B.device C.network D.processor
According to the author, computer security is ______.
A.a program B.a technique
C.a computer system D.a method
The passage is mainly about______
A.why computer criminals are often able to escape punishment
B.why computer crimes are difficult to detect by systematic inspections
C.how computer criminals manage to get good recommendations from their former employers
D.why computer crimes can't be eliminated
A.the speed of a computer B.the cost of a computer
C.the display of a computer D.both A and C
The study of computer architecture involves ______.
A.hardware organization only B.programming requirement only
C.both D.neither
A computer virus plagues other computers by ______.
A.misguiding the header information at the beginning of the file
B.preying on other computer files
C.attaching its infected code to the end of a host program
D.all of the above