December 2
November 2
December 12
November 12
Windows Vista
Windows XP
Windows 7
Windows 10
Shakunthala Devi
Savitri Devi
Suman Devi
Kamala Devi
Cyberethics
Information ethics
Global information ethics
All of these
Copyright
Industrial Property
Both a and b
None of these
Article 12
Article 19
Article 21
Article 31
Phising
Spamming
Virus
Malware
Antivirus
Hacking
Denial of Service (DoS) Attacks
Access Violations
Email
Web Content
Legitimate Sites
Trojans
Spyware
It cannot be changed.
It is expensive to implement.
It is easy to use and requires little training.
It is difficult to lose.
Traces
Hotspots
Patches
Service packs
Fingerprint scanner
Identity card
Screen-lock pattern
PIN
Spell check it
Review it
Verify and validate it
Organise and simplify it
Voicemail
Call forwarding
Call waiting
Instant messaging
Lagging caused by bad internet connections
Technology can fail during a call
Remote access
Bad audio quality
Downloading illegal software
Accessing hardware on a shared network
Stealing a network’s password
All are treated as Cyber Crime
Paytm
Facebook
Google
Microsoft