Answer:
special purpose application software
Explanation:
it is a type of software created to execute one specific task.for example a camera application on your phone wul only allow you to take and share pictures.
Other example of special purpose application are web browsers,calculators,media playors,calendar programs e.t.c.
E is the correct answer.
Risk is present, always. Risk can be good or bad. There is a risk you could win the lottery.
Furthermore, how we perceive risk is different than what risk is actually there.
Risk can be shared amongst members of a group or company and the amount of risk can be altered or ameliorated.
Risk can always be managed.
E is the correct answer.
The answer is : Socialization
the interactive process through which people learn the basic skills, values, beliefs, and behavior patterns of a society is called Socialization
During socialization process, a person tend to understand what is acceptable in the society and which is not. During the process, a person could also discover various unique characteristics from each individual
Answer: d)Phishing
Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.
The example mentioned in the question about eBay's security issue is also related with phishing where the fraud mails are sent to the users to gain or steal their personal information.
Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.