Question
_____________ is used by fraudsters to install malware
through public ports in customers mobile –:Solution
Juice jacking is a theoretical type of compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. The goal of the attack is to either install malware on the device, or to surreptitiously copy potentially sensitive data.
How is L related to F?
There are only six members in a family. J is the only daughter of T. T is husband of U. R is the only daughter in law of U. K is the only son of his par...
A is the son-in-law of P and is the brother-in-law of T who is the brother of V. V is the daughter of P. How is T related to P? Â
In a family, R is the father of U, S is the mother of V, U is the brother of V and T is married to U. Who is the father-in-law of T?
L is mother of E, who is sister of K. H is father of I. F is wife of H. K is son of I. How many children does I have?
If Radhika is the wife of Geet and Jayesh is married to Kaveri then how is Radhika related to Kaveri?
Answer the following question based on the direction given below.
If 'A#B' means 'A is father of B'
'A@B' means 'A is daughter of B'
<...How is P related to O?
V is the father of T, who is the grandson of G. S is the only daughter of G. G has only two children and only one of them is married. O is the mother-in...
How is E related to the wife of J?