LIST I | LIST II | ||
A | Exploits a Website to discover loopholes and vulnerabilities | I | Spoofing |
B | Forging email addresses | II | Plagiarism |
C | Insulting, degrading or intimidating someone online | III | Cyberbullying |
D | Using other's work and not giving enough citations | IV | White hat hacker |
List I | List II | ||
A | Keyboard Interrupt | I | It is raised when the user accidently hits the Ese key while executing a program, due to which the normal flow of the program |
B | Type Error | II | IT is raised when the file specified in a program statement cannot be opened. |
C | IO Error | III | IT is raised when the file specified in a program statement cannot be opened |
D | Import Error | IV | IT is raised when the requested module definition is not found |