Question
_____________ is used by fraudsters to install malware
through public ports in customers mobile –:Solution
Juice jacking is a theoretical type of compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. The goal of the attack is to either install malware on the device, or to surreptitiously copy potentially sensitive data.
Match the following questions?
 Input Devices                                   Operations
1. Printe...
_____________ viruses are embedded in a system's memory so it can be reactivated if the original virus is deleted.
What is the primary function of a web browser?
Which keyboard shortcut allows you to edit the content of a selected cell directly in the cell itself in Microsoft Excel 365?
The smallest resolvable part of the screen is ____
In Gmail, what do you use when you receive a mail and want to send the mail in response of the same mail and to the original sender only?
Who is founder of Wikipedia?
Which of the following options is used to display the content of active cell in MS-Excel 2019?
Malware Monitor in internet –
Which among the following ports is also known as Line Printer Port?