Copy of data created for safe - storage is _____.
D copy
STORED copy
Backup
Saved copy
An independent computer program that copies itself from one computer to other in a network is called :
Worm
Trojan
Bug
Anti virus
Tricking people through authentic looking email or website is called
Denial of Service
Phishing
Hacking
Cracking
A software that spies on your computer activities is
De - ware
Spyware
Steatlth ware
Malware
A message that appears to come from a person or company other than the real sender is a _______.
Spam
Popup
Ghost
Spoof
A digital document issued to a site by a certification authority of Internet.
E- code
Digital certificate
Digital signature
Digital id
Which of the following can be used to provide security while conducting e-commerce?
Encryption and decryption
Digital signatures
Both (1) and (2)
None of these
The electronic equivalent of junk mail is known as:
Adware
Cyber fraud
Packets
Type of back up in which only the data that changed since last backup is saved.
Add backup
Differential backup
Copy - backup
A program that deletes all the data from a computer is
Virus
Sweeper