Computer Science, asked by bsoren7833, 1 month ago

D. Match the following.

Column A

1. hacking
2. phishing
3. firewall
4. e-commerce
5. spamming
6. plagiarism
7. cyber bullying
8. software piracy

Column B

(a) act of real-life bullying in cyber space (b) program to manage communications (c) presenting someone else's work as your own
(d) act of redistributing a licensed copy without permission
(e) extracting information fraudulently (f) type of online business
(g) sending the same message to a large number of users
(h) infiltrating a remote computer system​

Answers

Answered by tiyasoorya
4

Answer:

D. Match the following.

Column A

1. hacking

2. phishing

3. firewall

4. e-commerce

5. spamming

6. plagiarism

7. cyber bullying

8. software piracy

Column B

(a) act of real-life bullying in cyber space (b) program to manage communications (c) presenting someone else's work as your own

(d) act of redistributing a licensed copy without permission

(e) extracting information fraudulently (f) type of online business

(g) sending the same message to a large number of users

(h) infiltrating a remote computer system

Answered by Anonymous
1

Answer:

eyfw1dbkouwqxvgw580j

Similar questions