Which of the following computer viruses hijack the system when it boots and deletes data?
1 Crore+ students have signed up on EduRev. Have you? Download the App |
________ are upgrades to the software and operating systems (OS) that fix security flaws in a program or product.
________________ is a piece of software made to keep track of (log) each keystroke made on the computer it is running on.
A private communication, such as a phone call, instant message, videoconference, or fax transmission, can be intercepted in real-time without the intended recipient's knowledge and is known as _______________.
Installing a ______________ is a good way to safeguard yourself from computer hacker attacks.
A __________ is a group of computer programs, usually malicious, that is used to gain unauthorized access to computers or parts of its software. They frequently conceal their own or other programs' presence.
________ are people's attempts to trick you into giving them your personal information by pretending to be someone else.
A ___________ is someone who utilizes their knowledge to break into someone else's computers to steal information or do harm.
_____________is a type of fraud in which a perpetrator uses email or other forms of contact to pose as a reliable organization or individual.