Select the odd one out
1). Interpreter
2). Operating System
3). Compiler
4). Assembler
1. ASCII-8 is:
4. Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as
6. The potential impact of a threat on a system is called as its ______________.
8. Which layer of the OSI model performs segmentation of a data stream
9. Word processing, spreadsheet, and photo-editing are examples of: