The action of illegally entering a computer or a network and using or destroying its database is called ___________ .
Cyber Squatting
Phishing
Cracking
Pornography
A wiki collection of proverbs and puzzles :
Wiki Species
Wiki Universities
Wiki Quotes
Wiki Dictionary
A collection of books on various subjects:
Wiki University
Wiki Books
Wiki News
Meta Wiki
In which year John Barger first used the coinage web log:
1999
1989
1977
1897
Who first used the coinage web log?
John Barger
Jonathan Thomas
Richard Mathew Stallman
Peter Merholz
The abbreviation of web log is:
Rasmol
Blog
PhET
All the above
The activities that challenge the sovereignty, integrity and security of countries using cyber technologies and tools are known as ___________.
Cyber Terrorism
The wiki centre of learning:
Wikipedia
The free online encyclopedia is:
The father of Wiki
Ward Cunningham
Jimmy Wales