List - I | List -II |
(A) Phishing | (I) Code redirects user to fake website without user knowing |
(B) Spyware | (II) Alters or deletes data |
(C) Pharming | (III) Fake email replicates well known organization |
(D) Viruses | (IV) Monitors information by monitoring key presses on a user's keyboard |
List-I (Sentences) | List-II (Prepositions) |
(A) The edited version of her article is indistinguishable __________ her first version. | (I) With |
(B) I just don’t feel any affinity ____________ his prose style. It’s too caustic. | (II) to |
(C) Her ideas are not all that dissimilar ___________ mine. | (III) for |
(D) It would be wrong to mistake his diffidence ___________ his arrogance or coldness. | (IV) from |