Computer Science, asked by rajlaxmeej, 7 months ago

Column B
D. Match the columns.
Column A
4 1. Computer crime
02. Computer fraud
b3. Crackers
C4. Computer ethics
a. To defraud people or companies for money
b. An unlawful act
c. Moral principles to control use of computers
d. Seek to gain unauthorized access to steal sensitive information
Answer the following murinn​

Answers

Answered by jayabaid20000
0

Explanation:

order to protect yourself you need to know about the different ways in which your computer can be compromised and your privacy infringed. In this section, we discuss a few common tools and techniques employed by the cyber criminals. This isn’t an exhaustive list by any means, but will give you a comprehensive idea of the loopholes in networks and security systems, which can be exploited by attackers, and also their possible motives for doing so.

Answered by Rikerika
0

Answer: 1. Computer crime - b. An unlawful act

2. Computer fraud - a. To defraud people or companies for money

3. Crackers - d. Seek to gain unauthorized access to steal sensitive information

4. Computer ethics - c. Moral principles to control use of computers

Similar questions