Explain the importance of timely data in the development of an information system, with examples.
What will be an ideal response?
Question 2
________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.
A) Spoofing
B) Phishing
C) Sniffing
D) Pretexting