Informatics Practices
To keep a computer protected, one should use updated software, be cautious while handling mails and surfing Internet, scanning computer regularly etc.
Related Questions
Spamming refers to the sending of bulk-mail by an identified or unidentified source.
Phishing involves authentic looking sites trying to collect your sensitive transactional and identity information.
Firewall can be implemented in software as well as in hardware.
Assertion. The trail of online activity is called Digital Footprint.
Reason. Digital footprints are the records of online activities of an individual.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.