Unsolicited commercial email is called …………….
2. ………………….. your computer and smartphone with strong, up-to-date security/anti-malware software.
3. A ………………………. is a piece of code which is capable of replicating itself and typically has a
detrimental
effect, such as corrupting the system or destroying data.
4. ……………………. Information is submitted voluntarily in social networking sites.
5. The default privacy settings in social networking site is …………………….
6. ……………………….. refers to assigning a keyword or phrase that describes the theme of a group of
articles,
photos, videos, or other types of media files in social networking sites.
7. …………………………… of information is defined as information to which the public does not have
general access.
8. …………………………… is a crime in which the attacker harasses a victim using electronic
communication.
9. An …………………….. process, ensures that authorized users are assigned confidential user
identification and passwords.
10. A ………………………. is a broad term used to describe all sorts of unwanted or malicious code.
Answers
Answer:
I don't now the answer
Explanation:
brainlist please
1.Spam.
2.The first Android smartphone released in late 2008, and by 2010, Android was the most ... A puzzling increase in data usage. ... New Android P includes several security improvements
3.Virus
4.Most social networks allow users to create detailed online profiles and connect with other users in some way. This may involve users sharing information with other users, such as one's gender, age, familial information, interests, educational background and employment. Your status.
5.public.
6.Social networking sites allow users to share ideas, digital photos and videos, posts, and to inform others about online or real-world.
7.Freedom of information laws allow access by the general public to data held by national governments.
8.Cyberstalking is a crime in which the attacker harasses a victim using electronic communication,
PLZZ marrk as brainliest