5 years ago in Operating System

all of the following are examples of real security & privacy risks except---------

[A] spam
[B] hackers
[C] viruses
Loading...
Next Question

Overall Stats

Attempted 501
Correct 251
Incorrect 40
Viewed 210

Answers

Guest
Guest
Tsega Asresa Mengistu
Tsega Asresa Mengistu - 1 week ago

Tsega Asresa Mengistu from Dessie, Ethiopia is saying viruses is correct answer

Arpita Dhote
Arpita Dhote - 1 month ago

Arpita Dhote from Pune, India is saying spam is correct answer

Renske Venter
Renske Venter - 4 months ago

Renske Venter from Phalaborwa, South Africa is saying spam is correct answer

moha qouta
moha qouta - 4 months ago

moha qouta from Gaza, Palestine is saying spam is correct answer

indhuja indhuja
indhuja indhuja - 4 months ago

indhuja indhuja from Erode, India is saying hackers is correct answer

Related Questions

A software package to implement a data base is----

  • [A] system analysis
  • [B] DBMS
  • [C] DASD

Bootstrap or vector is called

  • [A] Main program
  • [B] Grappling hook program
  • [C] Secondary program
  • [D] Primary storage

Which of the following is the gretest advantage of the spreadsheet?

  • [A] what-if
  • [B] Variable entry
  • [C] cross footing

The number of processes completed per unit time is known as __________.

  • [A] output
  • [B] throughput
  • [C] Efficiency
  • [D] Capacity