Informatics Practices
Related Questions
…………… is an attempt where a hacker tries to divert network traffic to a bogus site.
- Phishing scams
- Spoofing
- Eavesdropping
- Pharming attack
A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?
- Spamming
- Phishing
- Plagiarism
- Trojan
Fill in the blanks:
Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called a _________.
Fill in the blanks:
_________ is stealing someone else's intellectual work and representing it as your own without giving credit.