LIST I | LIST II |
---|---|
A. Doxing operations | IV. Cyber bullying |
B. FOSS | III. It grants a user substantial rights and freedom |
C. WORM | II. It is a program which copies itself across a network |
D. TROJAN HORSE | I. It is a program which is intended to carry out malicious operations |
Match List-I with List-II
List-I (Concepts) | List-II (Explanation) |
---|---|
(A) Netiquettes | (IV) Respect other's privacy |
(B) Cyber crime | (I) Online frauds |
(C) Online deliberation of issues in a democracy | (II) Cyber activism |
(D) Social media | (III) Rapid circulation of information/opinion on local and global scale |
Choose the correct answer from the options given below: