D. Match the following.
Column A
1. hacking
2. phishing
3. firewall
4. e-commerce
5. spamming
6. plagiarism
7. cyber bullying
8. software piracy
Column B
(a) act of real-life bullying in cyber space (b) program to manage communications (c) presenting someone else's work as your own
(d) act of redistributing a licensed copy without permission
(e) extracting information fraudulently (f) type of online business
(g) sending the same message to a large number of users
(h) infiltrating a remote computer system
Answers
Answered by
4
Answer:
D. Match the following.
Column A
1. hacking
2. phishing
3. firewall
4. e-commerce
5. spamming
6. plagiarism
7. cyber bullying
8. software piracy
Column B
(a) act of real-life bullying in cyber space (b) program to manage communications (c) presenting someone else's work as your own
(d) act of redistributing a licensed copy without permission
(e) extracting information fraudulently (f) type of online business
(g) sending the same message to a large number of users
(h) infiltrating a remote computer system
Answered by
1
Answer:
eyfw1dbkouwqxvgw580j
Similar questions
English,
16 days ago
Math,
16 days ago
English,
1 month ago
History,
1 month ago
Social Sciences,
9 months ago