Computer Science, asked by sauravthakur1107, 7 months ago

Unsolicited commercial email is called …………….

2. ………………….. your computer and smartphone with strong, up-to-date security/anti-malware software.

3. A ………………………. is a piece of code which is capable of replicating itself and typically has a

detrimental

effect, such as corrupting the system or destroying data.

4. ……………………. Information is submitted voluntarily in social networking sites.

5. The default privacy settings in social networking site is …………………….

6. ……………………….. refers to assigning a keyword or phrase that describes the theme of a group of

articles,

photos, videos, or other types of media files in social networking sites.

7. …………………………… of information is defined as information to which the public does not have

general access.

8. …………………………… is a crime in which the attacker harasses a victim using electronic

communication.

9. An …………………….. process, ensures that authorized users are assigned confidential user

identification and passwords.

10. A ………………………. is a broad term used to describe all sorts of unwanted or malicious code.​

Answers

Answered by Anonymous
1

Answer:

I don't now the answer

Explanation:

brainlist please

Answered by Abignya
3

1.Spam.

2.The first Android smartphone released in late 2008, and by 2010, Android was the most ... A puzzling increase in data usage. ... New Android P includes several security improvements

3.Virus

4.Most social networks allow users to create detailed online profiles and connect with other users in some way. This may involve users sharing information with other users, such as one's gender, age, familial information, interests, educational background and employment. Your status.

5.public.

6.Social networking sites allow users to share ideas, digital photos and videos, posts, and to inform others about online or real-world.

7.Freedom of information laws allow access by the general public to data held by national governments.

8.Cyberstalking is a crime in which the attacker harasses a victim using electronic communication,

PLZZ marrk as brainliest

Similar questions