Computer Science, asked by jochunyeseb, 9 months ago

Differentiate
2.
S. Junk
Bedil spam filtering software in order to prevent spamming. 1
5. When software is copied and distributed illegally, it is called Software Piracy. t
C. Multiple Choice Questions:
1. The unwanted bulk e-mails that come from strange sources are called as....
alled as Turk Snown
a. Spam
b. Trash
is the usage or imitation of the language and thoughts of another person and projected as
one's own original work.
a. Phishing
b. Plagiarism
s. Vishing
- refers to psychological manipulation of people into performing actions or divulging
confidential information..
a. Social Espionage
b. Social Engineering e. Social Media
...... is the process of transforming data into an unreadable code.
a. Encoding
b. Encryption
c. Decryption
.... is an act of sending an e-mail to a user misleading him to believe that it is from a trusted
person or organisation.
a. Phishing
b. Spamming
c. Hacking
D. Answer the following:
lab
Open Mic
Select the
the Layo
tab.
1. What do you mean by Computing Ethics? Write down any two ethical guidelines which should be followed
while using a computer.
Click on
Insert t
down t
draggir
side. R
You wi
an ins Ankit please help​

Answers

Answered by himanshurajmbd1
1

bhai itna bara question mat pucho iss aap pe

Answered by Sreemayi
1

please give the question in a recognizing way.. I'm not able to understand it..

once u scan just check and rearrange so that it will be clear to us.. sorry to say..

Similar questions