Q. ________ ‘are attempts by individuals to obtain confidential information from you by falsifying their identity.
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Q. Which of the following is another name for pre-programmed formula in Excel?
Q. What is the function of a modem?
Q. An example of peripheral equipment is
Q. A ____ is an icon on the desktop that provides a user with immediate access to a program or file.
Q. ____ is/are the most common type of software is used by the computer for general tasks.
Q. Connection or link to other documents or web pages that contain related information is called
Q. The main reason to encrypt a file is to ……………
Discusssion
Login to discuss.