II. Choice part 9 __ is people who use internet to exploit younger for sexual A. Cyber bullying B Cyber predator C .Phishing D. All 10.which of the following is stoping regular user from connecting to the service? A. Denial of service B. Virus C.Keylogger D. Worms 11. Which of the following is protecting computer system on network? A. Information B Cyber security C Fire D.Worms 12. __ is enables authorised user to acess infn without any interference? A. Confidentiality B Intgrity C.Data D . Avialibility 13. __ is recording the movement on keyboard and stealing password? A. Trojan horse B Adware C Keylogger D. Phishing 14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all 15. There are __ type of computer security A.3 B.5 C. 4 D.2

Solution3.8(285 votes)
Answer
Explanation
Similar Questions
Which type of loop is specifically designed to initialize, test, and increment or decrement a counter variable? A Do-While B Por C While D Do-Until
Question 11 The Do-While loop is a posttest loop. A True B False
Which of the following is NOT true about the Android operating system? Select one: A. It is a version of Linux. B. It is an embedded operating system. C. It runs on many phones and tablets. D. It is produced by Amazon.
Which of the following is NOT an example of malware? Select one: A. spam B. worms C. viruses D. spyware
Fill in the Blank Question One way to Empty Trash is to open the $\square $ menu, and click Empty Trash.
One of the biggest changes with Windows 11 is it's ability to run $\square $ apps on your Windows device. Need help? Review these concept resources. Read About the Concept
How many times would the following loop iterate? \begin{array}{|c|c|c|c|c|} \hline \ &\ Set\ (\ k=1\ )\ &\ While\ (\ k>5\ )\ &\ Display\ (\ k\ )\ &\ End\ While\ \\ \hline (A)\ &\ 0\ &\ &\ &\ \\ \hline (B)\ &\ 4\ &\ &\ &\ \\ \hline (C)\ &\ 5\ &\ &\ &\ \\ \hline (D)\ &\ infinite\ &\ &\ &\ \\ \hline \end{array}
Safety Connect services are available in __ Select the correct option and click NEXT Shipping Mode Shell Mode Active Mode All the above
Safety Connect operation depends on: Select the correct option and click NEXT. III Cellular connection availability and GPS satellite signal reception Satellite radio service Bluetooth phone pairing All of the above
This is the name of the search engine that powers the databases that curate and store research. DataFax HostScholar SAGE Publications EBSCOhost