------------------- contain information that is untrue.
A) cookies
B) virus
C) internet hoaxes
D) spam
Correct Answer:
Verified
Q6: --------------- is the technology which captivate the
Q7: -------------------- is meant for e-governance applications.
A)brnet
B)inflibnet
C)vast
D)nicnet
Q8: Spam means:
A)unwanted e-mail
B)virus
C)software
D)search engine
Q9: ----------------------- are small text files that some
Q10: Phishing is related to:
A)copy right
B)virus
C)e-learning
D)identity theft
Q12: A ---------------- defined as anyone who breaks
Q13: -------------------- is a computer program that attaches
Q14: What is logic bomb?
A)hacker
B)virus
C)trojan horse
D)cookies
Q15: --------------------- slightly different from virus.
A)trojan horses
B)worms
C)logic bombs
D)cookies
Q16: A computer user copies an application onto
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents