Professional Documents
Culture Documents
Write national help line number for cyber crime. How You
(b) track the status against a cyber crime. 3
How social engineering are helpful for business & How this
(d) work as harmful result discuss with a example. 3
(g)
How registry setting are useful to protect against cyber crime
5
draw a flow chart to perform all registry setting.
(h)
Explain Blue tooth hacking tools, is these tools are useful in
3
current scenario.
(I)
How Cyber Crime are classified connect cyber crime with
2
types of cyber criminals.
(J)
Every student submit class note’s Register up to unit III 45
without the missing any topic.
100
***All the best ***