| LIST I | LIST II |
|---|---|
| A. Doxing operations | IV. Cyber bullying |
| B. FOSS | III. It grants a user substantial rights and freedom |
| C. WORM | II. It is a program which copies itself across a network |
| D. TROJAN HORSE | I. It is a program which is intended to carry out malicious operations |
Match List-I with List-II
| List-I (Concepts) | List-II (Explanation) |
|---|---|
| (A) Netiquettes | (IV) Respect other's privacy |
| (B) Cyber crime | (I) Online frauds |
| (C) Online deliberation of issues in a democracy | (II) Cyber activism |
| (D) Social media | (III) Rapid circulation of information/opinion on local and global scale |
Choose the correct answer from the options given below: