Fill in the blanks:
i. ____________ has the potential to cause serious harm to a computer system.
ii. A threat can be ____________ and ___________.
iii. ____________Uses computer networks and security holes to replicate itself.
iv. ____________program can erase your hard disk.
v. Computer viruses were first widely seen in the late___________.
vi. Crime conducted with internet called ____________.
vii. ____________ is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent.
viii. File backup and System image are two ___________________methods.
EXERCISES
Answers
Answered by
11
Answer:
(i) cyberthreat
(ii) object and substance
(iii) a worm
(iv) DBAN
(v) 1980s
(vi) cybercrime
(vii) intruder
(viii) backup
Similar questions
Science,
1 day ago
Computer Science,
1 day ago
English,
2 days ago
Computer Science,
8 months ago
Physics,
8 months ago
Geography,
8 months ago