A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
A. Pakistan & India
B. Afghanistan & Iran
C. India & Mongolia
D. Pakistan & Afghanistan
A. 2002
B. 2003
C. 2004
D. 2005
A. Shanghai, China
B. Tashkent, Uzbekistan
C. Astana, Kazakhstan
D. Moscow, Russia
A. Lashkar-e-Taiba
B. Lashkar-i-Jhangvi Al-Almi
C. Tehreek-e-Taliban Pakistan
D. None of these
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
A. Time-related bomb sequence.
B. Virus.
C. Time bomb.
D. Trojan horse.