For the following questions answer them individually
…………..are attempts by individuals to obtain confidential information from you by falsifying their identity.
The devices which store information and that are used by computer for its functioning are called :
Which among the following is not such an operation which can be carried out on objects in graphic programme?