The use of the internet to perform illegal activities is ...
The use of the internet to perform illegal activities is generally called
Cyber crime
Packet sniffing
Phishing
Spamming
Correct answer is A
No explanation has been provided for this answer.
The exchange of information over a network follows a set of rules called ...
A file kept in case of an accident or natural disaster is called ...
Security breaches in computing cannot be prevented through the use of ...
S/N A B C D E F G H 1 STAFF DAYS ...
Which of the following operations prevent file loss? ...