Match the following:
Column ‘A’ | Column ‘B’ |
(1) Phishing | (A) Technique of extracting
confidential information |
2) Plagiarism | (B)Presenting someone else’s
work or idea as your own without their consent |
(3) Hacking | (C) Safe and responsible use of
information and communication technology |
(4) Cyber | (D) Refers to unauthorized intrusion
into a computer or a network |