A. Central B. Common C. Convenient D. Computer E. None of these
A. Dragging B. dropping C. right-clicking D. shift-clicking
A. hackers B. Spam C. Viruses D. identity theft
A. Node operating system B. Non-open software C. Network Operating system D. Non-operating software
A. IP address B. Domains C. Protocol D. Gateway
A. Voice over IP B. Video over IP C. Viruses over IP D. Virtual over IP
A. Maximum Area Network B. Minimum Area Network C. Main Area Network D. Metropolitan Area Network
A. Trojan horse. B. Virus. C. Time bomb. D. Time-related bomb sequence.
A. Tracking B. Formatting C. Crashing D. Allotting