C. Trojan horse
D. Phishing scam
E. None of these
You can use ___ to copy selected text, and ___ to paste it in a document
____________ is data that has been organized or presented in a meaningful fashion.
______ allows users to upload files to an online site so they can be viewed and edited from another location.
A __________ device can connect to a network without cable.
_____ is when the more power hungry components, such as the monitor and hard drive, are put in idle
The OSI model is divided into--------------processes called layers.
What is the full-form of ROM?
_____ are symbols that represents any character or combination of characters.
An error in a computer program ______
A ____________ is approximately a million bytes.