Explanation :
<p data-start="40" data-end="114"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out">The correct matches for the given statements are:</span></p> <p data-start="116" data-end="235"><strong data-start="116" data-end="122">i.</strong> <span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out">A type of program that is created with the purpose of causing damage, stealing data, or abusing computer system resources is known as a <strong data-start="136" data-end="154">computer virus / malware</strong>.</span> </p> <p data-start="237" data-end="363"><strong data-start="237" data-end="244">ii.</strong> <span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out">An email or communication that is intended to trick the recipient into disclosing secret or sensitive information, such as passwords or account details, is known as <strong data-start="165" data-end="177">phishing</strong>.</span> </p> <p data-start="365" data-end="575"><strong data-start="365" data-end="373">iii.</strong> Protecting an original invention from being sold or used by others for a specific period of time is known as a <strong data-start="485" data-end="495">patent</strong>. </p> <p data-start="577" data-end="761"><strong data-start="577" data-end="584">iv.</strong> The right to control your personal information and decide who can use it is known as <strong data-start="670" data-end="681">privacy</strong>.</p>
Correct Answered :
Wrong Answered :