MEDIUM
Earn 100

Attempting to gain unauthorized access to user’s system or information by pretending to be the user is known as:
(a)Phishing
(b)Spoofing
(c)Spamming
(d)Digital spying
(e)None of the above

50% studentsanswered this correctly
Important Questions on Computer and Internet Basics
EASY

EASY

EASY

EASY

MEDIUM

MEDIUM

EASY

MEDIUM

EASY
Which of the following is an electronic or paper log used to track computer activities?

EASY

EASY

EASY

EASY

EASY

EASY

EASY

EASY

EASY

EASY

EASY

