Q.1. Fill in the blanks
(i) ____ often directs users to a fake website whose look and feel are almost identical to the actual website
(ii) Undesired or illegal email messages are often known as _____.
(iii) The protection of internet connected systems including hardware, software and data from cyber attacks is termed as ______.
(iv) A ________ is a form of malicious software program which can corrupt or destroy systems or data.
Q.2. Match the following
Q.3. Identity whether the following statements are True or False.
(i) Hacking is a cybercrime
(ii) Phishing is a type of attack which is capable of stealing your password or credit card number.
(iii) Social networking sites are used to share passwords and other secret information.
(iv) When you are receiving harmful messages on your computer, you may block or delete them.