Computer Science, asked by jochunyeseb, 9 months ago

C.
Differentiate to
uted illegally, it is called Software Piracy. F
1.
Pain Tiltering software in order to prevent spamming
When software is copied and distributed illegally, it is calle
Multiple Choice Questions:
The unwanted bulk e-mails that come from strange sources
b. Trash
... is the usage or imitation of the languag
one's own original work.
a. Phishing
b. Plagiarism
a. Spam
sources are called as...
2.
Sv. Junk
Wation of the language and thoughts of another person and projecte
S. Wishing
actions or din
bson
Social Media
Telers to psychological manipulation of people into peno
confidential information..
a. Social Espionage
b. Social Engineering
........ is the process of transforming data into an unrea
a. Encoding
b. Encryption
...... is an act of sending an e-mail to a user misleading him
person or organisation.
a. Phishing
b. Spamming
c Hacking
c. Decryption
5.
8 an e-mail to a user misleading him to believe that it is from a trust
please help me ☺️✌️​

Answers

Answered by shashid394
0

Answer:

sorry guy I have no answer for your question

Answered by sumitkaushik291
0
it's too big question dear.. please ask one by one.
Similar questions