Column B
D. Match the columns.
Column A
4 1. Computer crime
02. Computer fraud
b3. Crackers
C4. Computer ethics
a. To defraud people or companies for money
b. An unlawful act
c. Moral principles to control use of computers
d. Seek to gain unauthorized access to steal sensitive information
Answer the following murinn
Answers
Answered by
0
Explanation:
order to protect yourself you need to know about the different ways in which your computer can be compromised and your privacy infringed. In this section, we discuss a few common tools and techniques employed by the cyber criminals. This isn’t an exhaustive list by any means, but will give you a comprehensive idea of the loopholes in networks and security systems, which can be exploited by attackers, and also their possible motives for doing so.
Answered by
0
Answer: 1. Computer crime - b. An unlawful act
2. Computer fraud - a. To defraud people or companies for money
3. Crackers - d. Seek to gain unauthorized access to steal sensitive information
4. Computer ethics - c. Moral principles to control use of computers
Similar questions