Question
Informatics Practices Question on Basics of Internet
**Match List - I with List - II.**List - I | List -II |
---|---|
(A) Phishing | (I) Code redirects user to fake website without user knowing |
(B) Spyware | (II) Alters or deletes data |
(C) Pharming| (III) Fake email replicates well known organization
(D) Viruses| (IV) Monitors information by monitoring key presses on a user's keyboard
Choose the correct answer from the options given below:
A
(A)-(III), (B)-(IV), (C)-(I), (D)-(II)
B
(A)-(IV), (B)-(III), (C)-(II), (D)-(I)
C
(A)-(II), (B)-(I), (C)-(III), (D)-(IV)
D
(A)-(I), (B)-(II), (C)-(IV), (D)-(III)
Answer
(A)-(III), (B)-(IV), (C)-(I), (D)-(II)
Explanation
Solution
The correct option is(A): (A)-(III), (B)-(IV), (C)-(I), (D)-(II)