(A) The process of optimizing a website for search engines
(B) A method of encrypting data to protect privacy
(C) The technique of bypassing a computer’s
(D) A type of cyber-attack aimed at stealing personal information through fraudulent emails
(A) The process of optimizing a website for search engines
(B) A method of encrypting data to protect privacy
(C) The technique of bypassing a computer’s
(D) A type of cyber-attack aimed at stealing personal information through fraudulent emails
(A) Tim Berners-Lee
(B) Gordon Moore
(C) Marcian Edward Ted Hoff
(D) Jack Kilby
(A) Diode
(B) Transistor
(C) Flip-flop
(D) Register
(A) Sending emails
(B) Video streaming
(C) Social media networking
(D) Storage and file sharing
(A) 1982, Tim Berners-Lee
(B) 1990, Vint Cerf
(C) 1971, Ray Tomlinson
(D) 1931, Charles Babbage
(A) Documents, images, videos
(B) A malicious parasite that feeds off your messages and destroy the content
(C) A receipt sent by the recipient
(D) None of these
(A) My Documents
(B) Auto save folder
(C) One drive
(D) Desktop
(A) Mark it as spam
(B) Move it to trash
(C) Archive it
(D) Forward it
WhatsApp us