Professional Documents
Culture Documents
5. A trojan acts like a real application or file to trick the user of the machine. It is
created to damage, disrupt, steal, or inflict some other harmful action on your
data or network.
8. All online services offer some form of E-mail, allowing people to send personal
e-mail messages to others.
9. Cookies are a small amount of data indicated on your web browser to trace a
certain piece of information.