LIST I | LIST II |
---|---|
A. Doxing operations | IV. Cyber bullying |
B. FOSS | III. It grants a user substantial rights and freedom |
C. WORM | II. It is a program which copies itself across a network |
D. TROJAN HORSE | I. It is a program which is intended to carry out malicious operations |
LIST I | LIST II |
---|---|
A. Slammer | IV. Virus |
B. Microwave | II. Uni directional |
C. Radio wave | I. Omni directional |
D. White hats | III. Ethical hacker |
List-I (Words) | List-II (Definitions) |
(A) Theocracy | (I) One who keeps drugs for sale and puts up prescriptions |
(B) Megalomania | (II) One who collects and studies objects or artistic works from the distant past |
(C) Apothecary | (III) A government by divine guidance or religious leaders |
(D) Antiquarian | (IV) A morbid delusion of one’s power, importance or godliness |