Which of the following refers to a technique for intercepting computer communications?
1). Phishing
2). Spoofing
3). Pretexting
4). Hacking
5). Sniffing
1. This is not a function in Excel ?
3. DSL is an example of a ____________ connection.
4. What does the SMTP in an SMTP server stand for
5. A good Sales person should have following quality/ qualities?
6. Which of the following is not an example of hardware ?
7. The of a system includes the programs or instructions.
9. A register that keeps track of the next instruction to be executed is called a???..
10. The user commands that are used to interact with a database is called as