|
ANSWERS1.(d) 2.(c) 3.(a) 4.(b) 6.(a) 7.(b) 8.(d) 9.(b) 10.(d)1.etticks 2.failure 3.bumpster biving 4.cybertheft 5.shoulder surfing 6.temport layer security (TLS) 7.antivirs 8.cipher 9.mosaic lititions 1.(F)2.(F) 3.(T) 4.(T) 5.(F) 6.(T) 7.(T) 8.(F) 9.(T) 10.(T) 1. techology people and processes 2. identification username and autjentication pass word 3. encryption bigital properity 5. copy left licences 6. plagiarism 7.freedom of expression 8.public domain 9.beriley software bestribution 10. accidental plaguism |
Learning Computers with Kips
| 217 |
| Previous page | Home | Next page |