Please wait...
/
-
Junk e-mail is also called as ______.
Verify mobile number to view the solution
Email spam, also known as junk email or unsolicited bulk email(UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.
Software such as viruses, worms and Trojan horses that has a malicious content is known as _____.
Two of the most common types of malware are viruses and worms. These types of programs are able to self-replicate and can spread copies of themselves, which might even be modified copies.
Note:- malware must have the ability to propagate. The difference is that a worm operates more or less independently of other files, whereas a virus depends on a host program to spread itself. These and other classes of malicious software are described below.
Which of the following is used by the browser to connect to the location of the Internet resources?
URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet. A URL has two main components: Protocol identifier: For the URL https://anyone.co , the protocol identifier is http.
Specialised programs that assist users in locating information on the Web are called_____.
Search engines are the programs that search documents for specified keywords and return a list of the documents where the keywords were found. A web search engine is a software system that is designed to search for information on the World Wide Web.
Note:- Google and Yahoo are the major search engines used throughout the World.
______ services are available free at portals on the Web.
Electronic mail, most commonly referred to as email or e-mail since around 1993, is a method of exchanging digital messages from an author to one or more recipients. Email operates across the Internet or other computer networks.
A program designed to destroy data on your computer which can travel to "infect" other computers is called a___.
A program designed to destroy data on your computer which can travel to "infect" other computers is called a virus.
Note:- It is a harmful activity on infected hosts even rendering the computer useless.
An educational institution would generally have the following in its domain name____.
An educational institution would generally have the following in its domain name .edu . The domain name edu is a sponsored top-level domain in the Domain Name System of the Internet.
The process of a computer receiving information from a server on the Internet is known as _____.
In computer networks, to download means to receive data to a local system from a remote system or to initiate such a data transfer. Examples of a remote system from which a download might be performed include a web server, FTP server, email server, or other similar systems.
______ are often delivered to a PC through an email attachment and are often designed to do harm.
Viruses are often delivered to a PC through an email attachment and are often designed to do harm.
Note:- A computer virus is a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
Coded entries which are used to gain access to a computer system are called ____.
Password is a type of protection which contains code to access.
Note: A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource.
Correct (-)
Wrong (-)
Skipped (-)