1. What is a common medium used by thieves to steal others' identities?
2. To select a column the easiest method is to?
3. Which of the following is the valid subnet mask for class B IP Address?
4. Functions of keys F1, F2 and F3 are _____________ respectively.
5. ____________is a set of interface specifications for high speed wired communication between electronics systems peripherals.
6. Which among the following is not legitimate type of computer virus?
7. __________ is a self-contained step-by-step set of operations to be performed.
8. What is Windows 10?
9. What does MODEM stands for?
10. What type of internet technology sends you the information without your request?