Converting the computer language of 1's and 0's to characters that a person can understand is called :
Which technology allows users to shift their desktop computing activites to computers on the internet
The potential impact of a threat on a system is called as its :
Which of the following refers to a technique for intercepting computer communications
Which of the following devices sends and receives data over telephone lines to and from computers
Which of the following users tunnelling protocol to securely send private network data over the Internet