You are on page 1of 2

Htoo Wai Aung

Section E

1. C
2. C
3. B
4. D
5. B
6. D
7. B
8. B
9. C
10. B
11. A
12. C
13. D
14. C
15. A

16. People use tags to mark ownership, note boundaries and to show online identity.

17 1. Phishing is a technique which the criminals use to get personal data and credit
information from users by creating so many messages that appear to be from a real
organisation.
2. Pharming is just like phishing. Furthermore, the criminals create fake versions of
websites to make an illusion of a real one. Then they receive users' info and later use it to
get personal data and credits.
Both of the risks can be prevented by building up a firewall as it generates examination
for network address and ports of data.

18.
blog wiki

A blog is a website that contains written A wiki is a database which a group of


articles as well as diaries. It updates collaborating users can add and edit the
regularly. sources

It could only be controlled by the a person It is functioned to allow everyone to collab


or people and is not publicised editing and create a web page

19. (a) job sharing


(b) part time job
(c) working flexible hours
(d) working compressed hours

23. Organisations need to back up their data regularly in case of accidental deletions.

24.
Vlog Video blog—--------------

Chat online , real-time—-----------

prodcast A series of…………..

Social networking websites Online communities where


individuals…………

wikis Websites provide information………………..

You might also like