| LIST I | LIST II |
|---|---|
| A. Doxing operations | IV. Cyber bullying |
| B. FOSS | III. It grants a user substantial rights and freedom |
| C. WORM | II. It is a program which copies itself across a network |
| D. TROJAN HORSE | I. It is a program which is intended to carry out malicious operations |
Match List-I with List-II
| List-I (Concepts) | List-II (Explanation) |
|---|---|
| (A) Netiquettes | (IV) Respect other's privacy |
| (B) Cyber crime | (I) Online frauds |
| (C) Online deliberation of issues in a democracy | (II) Cyber activism |
| (D) Social media | (III) Rapid circulation of information/opinion on local and global scale |
Choose the correct answer from the options given below:
In a sequence of numbers, each term is generated by multiplying the previous term by 2 and then subtracting 1. If the first term is 3, what is the fourth term in the sequence?
The following data shows the number of students in different streams in a school: 
Which type of graph is best suited to represent this data?