Match the following:

Column ‘A’ Column ‘B’
(1) Phishing (A) Technique of extracting
 confidential information
2) Plagiarism (B)Presenting someone else’s
 work or idea as your own without
 their consent
(3) Hacking (C) Safe and responsible use of
information and communication
 technology
(4) Cyber (D) Refers to unauthorized intrusion
 into a computer or a network
8 views

1 Answers

Column ‘A’ Column ‘B’
(1) Phishing (A) Technique of extracting
 confidential information
2) Plagiarism (B)Presenting someone else’s
 work or idea as your own without
 their consent
(3) Hacking (D) Refers to unauthorized intrusion
 into a computer or a network
(4) Cyber (C) Safe and responsible use of
 information and communication
  technology

8 views