Match the following: Phishing, Plagiarism, Technique of extracting confidential information, Presenting someone else’s work or idea as your own
Match the following:
| Column ‘A’ | Column ‘B’ |
| (1) Phishing | (A) Technique of extracting
confidential information |
| 2) Plagiarism | (B)Presenting someone else’s
work or idea as your own without their consent |
| (3) Hacking | (C) Safe and responsible use of
information and communication technology |
| (4) Cyber | (D) Refers to unauthorized intrusion
into a computer or a network |
8 views
1 Answers
| Column ‘A’ | Column ‘B’ |
| (1) Phishing | (A) Technique of extracting
confidential information |
| 2) Plagiarism | (B)Presenting someone else’s
work or idea as your own without their consent |
| (3) Hacking | (D) Refers to unauthorized intrusion
into a computer or a network |
| (4) Cyber | (C) Safe and responsible use of
information and communication technology |
8 views
Answered