LIST I | LIST II | ||
| A | Exploits a Website to discover loopholes and vulnerabilities | I | Spoofing |
| B | Forging email addresses | II | Plagiarism |
| C | Insulting, degrading or intimidating someone online | III | Cyberbullying |
| D | Using other's work and not giving enough citations | IV | White hat hacker |
| List I | List II | ||
| A | Keyboard Interrupt | I | It is raised when the user accidently hits the Ese key while executing a program, due to which the normal flow of the program |
| B | Type Error | II | IT is raised when the file specified in a program statement cannot be opened. |
| C | IO Error | III | IT is raised when the file specified in a program statement cannot be opened |
| D | Import Error | IV | IT is raised when the requested module definition is not found |
The bulking of the sand is increased in volume from 20% to 40% of various sand and moisture content ranges from ……… to ……….. percent.
