Q1: The false process of attempting to obtain personal information.
Q2: The stealing unnoticeable amount from every account of a bank and deposited it in a particular account.
Q3: The moving images of real events.
Q4: The main line of defense between a local network, or intranet, and the internet.
Q5: The unprocessed raw information.