LIST I | LIST II | ||
| A | Exploits a Website to discover loopholes and vulnerabilities | I | Spoofing |
| B | Forging email addresses | II | Plagiarism |
| C | Insulting, degrading or intimidating someone online | III | Cyberbullying |
| D | Using other's work and not giving enough citations | IV | White hat hacker |
| List I | List II | ||
| A | Keyboard Interrupt | I | It is raised when the user accidently hits the Ese key while executing a program, due to which the normal flow of the program |
| B | Type Error | II | IT is raised when the file specified in a program statement cannot be opened. |
| C | IO Error | III | IT is raised when the file specified in a program statement cannot be opened |
| D | Import Error | IV | IT is raised when the requested module definition is not found |
Fill in the blank with the correct option.
The teacher believed that the student’s sudden lack of interest in class was an ..........., as he had always been enthusiastic and attentive.