Computer Science, asked by NikitaSinha2607, 2 days ago

Fill in the blanks:
i. ____________ has the potential to cause serious harm to a computer system.
ii. A threat can be ____________ and ___________.
iii. ____________Uses computer networks and security holes to replicate itself.
iv. ____________program can erase your hard disk.
v. Computer viruses were first widely seen in the late___________.
vi. Crime conducted with internet called ____________.
vii. ____________ is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent.
viii. File backup and System image are two ___________________methods.
EXERCISES

Answers

Answered by Anchalkanthi
11

Answer:

(i) cyberthreat

(ii) object and substance

(iii) a worm

(iv) DBAN

(v) 1980s

(vi) cybercrime

(vii) intruder

(viii) backup

Similar questions