1 |
A --------- is a trail of data of a user tha he leaves while using the intenet. |
Bullying
Virus
Digital Foot prints
Foot prints
|
2 |
A---------------- is type of software or malware that spreads between several computers and corrupts data. |
Spam
Cracker
Bullying
Virus
|
3 |
------- is a technique used by cyber criminals to gain the information from the dividuals. |
Cracking
Bullying
Social Engineering
Spamming
|
4 |
---------------- refers to the act of breaking into systems to steal or distroy data. |
Spamming
Hacking
Cracking
Cyber troll
|
5 |
It refers to the spoolingof bulk mail by an unidentified source. |
Spamming
Phishing
Hacking
Cyber Troll
|
6 |
The best defence against............ assaults is human intellect and comprehension. |
Phishing
Spamming
Hacking
Social engineering
|
7 |
At its ismplest, ......... is a sysgtem of moral principles. |
Ethics
Digital Environment
E-mail spoofing
None of these
|
8 |
The Website or programs known as..... is where users can share their content. |
Internet
Social Media
Meta
e- learning
|
9 |
Learning conducted via electronic media typicaly on internet is called. |
Blog
Meta
Web-service
e-learning
|
10 |
------------- are virtual diaries created by people for share their hobbies, thoughts with like minded people. |
Internet
Meta
Spam
Blogs
|