Identity the correct order of the words A - D given below to complete the paragraph about internet security.

Illegal access to a computer system is known as ______. ______ are programs that self - replicate and are designed to disrupt computer systems. ______ is where a user is sent legitimate looking emails; as soon as the email is opened and the recipient clicks on the embedded link, they are sent to a fake website. Software that monitors key presses on a user's keyboard, and relays the information back to the person who sent the software, is known as ______.

A. Phishing

B. Hacking

C. Spyware

D. Viruses

Choose the correct answer from the options given below:

This question was previously asked in
UGC NET Official Paper 1: Held On 16 June 2023 Shift 2
View all UGC NET Papers >
  1. A, D, B, C
  2. B, A, D, C
  3. B, D, A, C
  4. C, D, A, B

Answer (Detailed Solution Below)

Option 3 : B, D, A, C
Free
UGC NET Paper 1: Held on 21st August 2024 Shift 1
10.8 K Users
50 Questions 100 Marks 60 Mins

Detailed Solution

Download Solution PDF

The correct answer is B, D, A, C

Explanation:
 

Key Points 

Here is the paragraph about internet security with the words in the correct order:

Hacking is illegal access to a computer system.

Viruses are programs that self-replicate and are designed to disrupt computer systems.

Phishing is where a user is sent legitimate looking emails; as soon as the email is opened and the recipient clicks on the embedded link, they are sent to a fake website.

Spyware is software that monitors key presses on a user's keyboard, and relays the information back to the person who sent the software.

Here is an explanation of each term:

  • Hacking: Hacking is the unauthorized access to a computer system or network. Hackers can use this access to steal data, install malware, or disrupt operations.
  • Viruses: Viruses are malicious software programs that can replicate themselves and spread from one computer to another. Viruses can cause a variety of problems, including data loss, system crashes, and even hardware damage.
  • Phishing: Phishing is a type of social engineering attack where attackers send emails that appear to be from legitimate sources in order to trick victims into revealing personal information, such as passwords or credit card numbers.
  • Spyware: Spyware is a type of malware that is designed to track a user's online activity. Spyware can be used to collect personal information, such as browsing history, passwords, and credit card numbers.
Latest UGC NET Updates

Last updated on Jun 11, 2025

-> The UGC NET Exam Schedule 2025 for June has been released on its official website.

-> Check UPSC Prelims Result 2025, UPSC IFS Result 2025, UPSC Prelims Cutoff 2025, UPSC Prelims Result 2025 Name Wise & Rollno. Wise

-> The UGC NET Application Correction Window 2025 is available from 14th May to 15th May 2025.

-> The UGC NET 2025 online application form submission closed on 12th May 2025.

-> The June 2025 Exam will be conducted from 21st June to 30th June 2025

-> The UGC-NET exam takes place for 85 subjects, to determine the eligibility for 'Junior Research Fellowship’ and ‘Assistant Professor’ posts, as well as for PhD. admissions.

-> The exam is conducted bi-annually - in June and December cycles.

-> The exam comprises two papers - Paper I and Paper II. Paper I consists of 50 questions and Paper II consists of 100 questions. 

-> The candidates who are preparing for the exam can check the UGC NET Previous Year Papers and UGC NET Test Series to boost their preparations.

Get Free Access Now
Hot Links: teen patti real cash game teen patti winner teen patti gold real cash teen patti real cash