Match the following:

Column ‘A’ Column ‘B’
(1) Phishing (A) Technique of extracting
 confidential information
2) Plagiarism (B)Presenting someone else’s
 work or idea as your own without
 their consent
(3) Hacking (C) Safe and responsible use of
information and communication
 technology
(4) Cyber (D) Refers to unauthorized intrusion
 into a computer or a network

Share with your friends
Call

Column ‘A’ Column ‘B’
(1) Phishing (A) Technique of extracting
 confidential information
2) Plagiarism (B)Presenting someone else’s
 work or idea as your own without
 their consent
(3) Hacking (D) Refers to unauthorized intrusion
 into a computer or a network
(4) Cyber (C) Safe and responsible use of
 information and communication
  technology

Talk Doctor Online in Bissoy App