Differentiate
2.
S. Junk
Bedil spam filtering software in order to prevent spamming. 1
5. When software is copied and distributed illegally, it is called Software Piracy. t
C. Multiple Choice Questions:
1. The unwanted bulk e-mails that come from strange sources are called as....
alled as Turk Snown
a. Spam
b. Trash
is the usage or imitation of the language and thoughts of another person and projected as
one's own original work.
a. Phishing
b. Plagiarism
s. Vishing
- refers to psychological manipulation of people into performing actions or divulging
confidential information..
a. Social Espionage
b. Social Engineering e. Social Media
...... is the process of transforming data into an unreadable code.
a. Encoding
b. Encryption
c. Decryption
.... is an act of sending an e-mail to a user misleading him to believe that it is from a trusted
person or organisation.
a. Phishing
b. Spamming
c. Hacking
D. Answer the following:
lab
Open Mic
Select the
the Layo
tab.
1. What do you mean by Computing Ethics? Write down any two ethical guidelines which should be followed
while using a computer.
Click on
Insert t
down t
draggir
side. R
You wi
an ins Ankit please help
Answers
Answered by
1
bhai itna bara question mat pucho iss aap pe
Answered by
1
please give the question in a recognizing way.. I'm not able to understand it..
once u scan just check and rearrange so that it will be clear to us.. sorry to say..
Similar questions
History,
5 months ago
History,
5 months ago
Math,
5 months ago
Computer Science,
9 months ago
History,
1 year ago