Question
Download Solution PDFIdentity the correct order of the words A - D given below to complete the paragraph about internet security.
Illegal access to a computer system is known as ______. ______ are programs that self - replicate and are designed to disrupt computer systems. ______ is where a user is sent legitimate looking emails; as soon as the email is opened and the recipient clicks on the embedded link, they are sent to a fake website. Software that monitors key presses on a user's keyboard, and relays the information back to the person who sent the software, is known as ______.
A. Phishing
B. Hacking
C. Spyware
D. Viruses
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Detailed Solution
Download Solution PDFThe correct answer is B, D, A, C
Explanation:
Here is the paragraph about internet security with the words in the correct order:
Hacking is illegal access to a computer system.
Viruses are programs that self-replicate and are designed to disrupt computer systems.
Phishing is where a user is sent legitimate looking emails; as soon as the email is opened and the recipient clicks on the embedded link, they are sent to a fake website.
Spyware is software that monitors key presses on a user's keyboard, and relays the information back to the person who sent the software.
Here is an explanation of each term:
- Hacking: Hacking is the unauthorized access to a computer system or network. Hackers can use this access to steal data, install malware, or disrupt operations.
- Viruses: Viruses are malicious software programs that can replicate themselves and spread from one computer to another. Viruses can cause a variety of problems, including data loss, system crashes, and even hardware damage.
- Phishing: Phishing is a type of social engineering attack where attackers send emails that appear to be from legitimate sources in order to trick victims into revealing personal information, such as passwords or credit card numbers.
- Spyware: Spyware is a type of malware that is designed to track a user's online activity. Spyware can be used to collect personal information, such as browsing history, passwords, and credit card numbers.
Last updated on Jun 11, 2025
-> The UGC NET Exam Schedule 2025 for June has been released on its official website.
-> Check UPSC Prelims Result 2025, UPSC IFS Result 2025, UPSC Prelims Cutoff 2025, UPSC Prelims Result 2025 Name Wise & Rollno. Wise
-> The UGC NET Application Correction Window 2025 is available from 14th May to 15th May 2025.
-> The UGC NET 2025 online application form submission closed on 12th May 2025.
-> The June 2025 Exam will be conducted from 21st June to 30th June 2025
-> The UGC-NET exam takes place for 85 subjects, to determine the eligibility for 'Junior Research Fellowship’ and ‘Assistant Professor’ posts, as well as for PhD. admissions.
-> The exam is conducted bi-annually - in June and December cycles.
-> The exam comprises two papers - Paper I and Paper II. Paper I consists of 50 questions and Paper II consists of 100 questions.
-> The candidates who are preparing for the exam can check the UGC NET Previous Year Papers and UGC NET Test Series to boost their preparations.