POP is a protocol used by e-mail clients to download e-mails to your computer. The correct option among all the options that are given in the question is the last option or option "d". The full form of POP is Post Office Protocol. After the email has been downloaded, the email gets erased from the server automatically.
Answer:
Phishing
Explanation:
Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.
Phishing could be carried out via emails, telephones, or even text messages.
In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.
Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.
Answer:
You did not buy the rights to the copyrighted material when you bought it from Apple Music
Explanation:
When you bought the song from Apple Music, you paid them for your using of the song to listen to, as stated in the agreement that you wouldve been required to agree to. Apple is only allowed to provide the material for personal use to its users, with it part of its fees going to the original copyright holders.
It's everyone's responsibility to report cyberbullying.
The tone is important whenever you are talking to someone else.
You can literally say anything in virtual world, but you should behave yourself
If everybody knows the common text phrases, then it's fine, but it will be better to talk formally.