We are not sure when this helpline number has been created. But because the helpline number is flooded with complaints we can certainly assume that such issues are existing in plenty. Hence assumption II and option 2 is the correct answer.
Which of the following authentication methods is the most secure?
Which of the following is an example of a public key encryption algorithm?
Phishing is an example of what type of computer security threat?
Which memory type is directly accessed by the CPU to retrieve and store data?
In LibreOffice Writer, which view shows all styles available?
Which is a track change option in LibreOffice Writer?
What does cloud computing involve?
Who designed the Data Encryption Standard (DES)?
Which of the following is word processing software?
How many languages are supported in LibreOffice 0.3?