A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
A. Jupiter
B. Venus
C. Mars
D. Mercury
A. Upper Sindh
B. Lower Sindh
C. Central Sindh
D. Southern Sindh
A. Encryption program
B. Surge protector
C. Firewall
D. UPS
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
A. Venus
B. Mercury
C. Mars
D. Moon
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
A. A virus
B. Spybot
C. Logic bomb
D. Security patch