Siddharth Mukherji Solutions for Chapter: Computer & IT, Exercise 1: Assessment
Siddharth Mukherji General Science Solutions for Exercise - Siddharth Mukherji Solutions for Chapter: Computer & IT, Exercise 1: Assessment
Attempt the practice questions on Chapter 4: Computer & IT, Exercise 1: Assessment with hints and solutions to strengthen your understanding. Encyclopedia of General Science for General Competitions solutions are prepared by Experienced Embibe Experts.
Questions from Siddharth Mukherji Solutions for Chapter: Computer & IT, Exercise 1: Assessment with Hints & Solutions
Junk E-mail is also called:

A hacker contacts your phone or E-mails and attempts to acquire your password is called:

The main reason to encrypt a file is to:

The first PC virus was developed in:

Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication?

First boot sector virus is:

Which of the following inputs a computer's memory, but unlike a virus, it does not replicate itself?

The first computer virus is:
