Here are the answers to the questions:
-
An attempt to obtain sensitive information such as username, password and credit cards details etc. for malicious reasons by posing trustworthy source in e-mails is called Phishing.
* B
-
The diagram shows multiple client computers connected to a central server, where clients request resources from the server. This is best described as a Client/Server architecture.
* B
-
OSI stands for Open System Interconnection in networking.
* C
-
In Boolean algebra, the complement law states that A+Aˉ is equal to 1.
* D
-
In database management systems, data is primarily stored in Table format (especially in relational databases).
* C
-
A set of objects of the same type that share the same properties or attributes is known as an Entity set.
* C
-
The Slide sorter feature allows you to organize and sequence slides in a presentation by viewing them as thumbnails.
* A
-
In programming paradigms, encapsulation refers to the bundling of data and methods that operate on that data into a single unit, called a class or objects.
* B
Last free one today — make it count tomorrow, or type /upgrade for unlimited.