Select the odd one out.
A Windows Movie Maker
D Disk CleanUp
Obtaining unauthorized access to other systems in a network is called _____.
Generally, the web pages available over the web are written with the help of ______ .
All the URLs are translated into numeric address using the ______. The numeric addresses, are called the ______.
A Search engine, Domain
B DNS, IP address
C Browser, Protocol
D HTTP, Links
If you want to send the same e-mail to more than one person, you can type multiple e-mail addresses separated by_______.
Search engines search for websites based on ________.
In how many different ways can Buzzo reach to the bone?