1) Fill in the blanks:
a) A _________ can be an online stranger or a person known to the targeted person.
b) ________ is an act of harming or harassing though information technology in a deliberate manner.
c) A ______ is a program or set of programs that disrupts the normal functioning of a computer.
d) A __________ is a security system that protects your computer by preventing the unauthorized users from gaining access to it through the network or Internet.
e) In _______ a person is identified by retinal scan, finger prints, voice recognition etc.
f) A _______ database stores data in several tables and links those tables together to get a common piece of information.
g) Apps can be easily downloaded from ________ in android phones.
h) _________ app do not need web access and run independently on a computer.
i) The abbreviation of the word “application” is ________.
j) A ___ is an effective way to organize and summarise data for viewing or printing.
Answers
Answered by
1
Answer:
A HACKER can be an online stranger or a person known to the targeted person.
Answered by
1
Answer:
1. hacker
2.cryber crime
3.computer virus
4.anti virus
5.biometric
6.playstore
7.
8.
9.
10.
pls mark brainlist
Similar questions