7 years ago
in Operating System
All of the following are examples of real security and privacy risks except
Loading...
Overall Stats
Attempted
457
Correct
79
Incorrect
139
Viewed
239
Answers
Manoj Gehlot -
4 years ago
d should be answer..sir should explean this question
-
Log in to add a comment
H Kumar -
2 months ago
H Kumar from Chennai, India is saying Spam is correct answer
Shubham Yerawar -
4 years ago
Shubham Yerawar from Ambad, India is saying Spam is correct answer
Chetan Chilhate -
4 years ago
Chetan Chilhate from India is saying Hacker is correct answer
Sanket Malpure -
4 years ago
Sanket Malpure from Pune, India is saying virus is correct answer
Related Questions
Which model estimates the total effort in terms of person,months of the technical project staff?
- [A] COCOMO model
- [B] Prototyping
- [C] spiral
- [D] Waterfall
What is Page stealing ?
- [A] It takes page frames from other working sets
- [B] To increase the capacity of main memory
- [C] To speed up main memory read operation
- [D] None of above
The part of machine level instruction, which tells the central processor what has to be done, is
- [A] Operation code
- [B] Address
- [C] Locator
- [D] Flip-Flop
- [E] None of the above