Computer Applications
Using someone else's twitter handle to post something, will be termed as :
- Fraud
- Identity theft
- Online stealing
- Violation
Related Questions
Policies of companies related to protection of personal information of users online are meant to safeguard …………… of users.
- Safety
- Security
- Privacy
- Well being
Credit card fraud may include :
- Stealing of credit card
- Unauthorized and illegal use of credit card
- Both of the above
- Neither
Standard security protocol that establishes encrypted links between a web server and a browser is called …………… .
- Online safety technology
- SDT technology
- Web encryption technology
- Secure sockets layer technology
Things like these, e.g., online email account, social media account or handle, online shopping account, online photo sharing account, trademarks, patents, own registered domain name etc. are collectively called …………… .
- Online identity
- Online estate
- Digital identity
- Digital property