1.1.1 Altering the sender's address and other parts of an e-mail header to appear as if the e-mail originated from a different source is called …
A - NSC Information Technology - Question 1 - 2017 - Paper 2
Question 1
1.1.1 Altering the sender's address and other parts of an e-mail header to appear as if the e-mail originated from a different source is called …
A. spoofing.
B. ph... show full transcript
Worked Solution & Example Answer:1.1.1 Altering the sender's address and other parts of an e-mail header to appear as if the e-mail originated from a different source is called …
A - NSC Information Technology - Question 1 - 2017 - Paper 2
Step 1
Altering the sender's address and other parts of an e-mail header to appear as if the e-mail originated from a different source is called …
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is A. spoofing.
Step 2
Which ONE of the following does NOT refer to an attribute of ROM?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is D. More ROM can be plugged into slots on the motherboard.
Step 3
Which combination of computer file management techniques is used when an image file is changed from bmp format to jpeg format using image software?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is A. (i) and (ii).
Step 4
The communication standard most commonly used to connect cellphones to hands-free car kits is …
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is B. 802.11g wireless.
Step 5
What will be the content of the sAnswer variable?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!