An attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication is termed as:
Who is considered to be the first programmer
Name the Act that governs the internet usage in India:
An attempt to make a computer resource unavailable to its intended users is called:
Which plan was called as Mehalnobis plan named after the well-known economist
To change negative family and community attitudes towards the girl child at birth and towards her mother is the prime objective of