Question
Computer Science Question on Computer Abbreviations
Match LIST I with LIST IILIST I
| LIST II
---|---
A| Exploits a Website to discover loopholes and vulnerabilities| I| Spoofing
B| Forging email addresses| II| Plagiarism
C| Insulting, degrading or intimidating someone online | III| Cyberbullying
D| Using other's work and not giving enough citations | IV| White hat hacker
Choose the correct answer from the options given below
A
(A)-(II), (B)-(III), (C)-(IV), (D)-(I)
B
(A)-(IV), (B)-(III), (c)-(I), (D)-(II)
C
(A)-(IV)(B)-(I), (C)-(III), (D)-(II)
D
(A)-(III), (B)-(IV), (C)-(I), (D)-(II)
Answer
(A)-(IV)(B)-(I), (C)-(III), (D)-(II)
Explanation
Solution
The correct option is (C) : (A)-(IV), (B)-(I), (C)-(III), (D)-(II)