Computer Science, asked by jyotikiranmurmu614, 10 hours ago

1) Fill in the blanks:

a) A _________ can be an online stranger or a person known to the targeted person.
b) ________ is an act of harming or harassing though information technology in a deliberate manner.
c) A ______ is a program or set of programs that disrupts the normal functioning of a computer.
d) A __________ is a security system that protects your computer by preventing the unauthorized users from gaining access to it through the network or Internet.
e) In _______ a person is identified by retinal scan, finger prints, voice recognition etc.
f) A _______ database stores data in several tables and links those tables together to get a common piece of information.
g) Apps can be easily downloaded from ________ in android phones.
h) _________ app do not need web access and run independently on a computer.
i) The abbreviation of the word “application” is ________.
j) A ___ is an effective way to organize and summarise data for viewing or printing.​

Answers

Answered by ranmalegeeta4
1

Answer:

A HACKER can be an online stranger or a person known to the targeted person.

Answered by palaksing2021
1

Answer:

1. hacker

2.cryber crime

3.computer virus

4.anti virus

5.biometric

6.playstore

7.

8.

9.

10.

pls mark brainlist

Similar questions