Computer Science
Fill in the blanks:
Unauthorized monitoring of other people's communication is known as _________.
Computing Safety & Ethics
2 Likes
Answer
eavesdropping
Answered By
2 Likes
Related Questions
Fill in the blanks:
Ensuring that users or customers provide information that is associated with identity of a real person is known as _________ verification.
Fill in the blanks:
If the user is able to provide a legal email id, he is considered a/an _________ user.
Fill in the blanks:
Flooding a system with junk mail is a _________ type of attack.
Fill in the blanks:
A _________ is a type of browser cookie that is designed to be permanently stored on a user's computer and difficult to detect and remove.