1.
This is the first 4G mobile network started in South Korea in 2006 ___ ___ ___ ___
2.
This is a version of 5G mobile networks
3.
This company pioneered the technological leap in the United States, rolling out its initial 5G services in Chicago and Minneapolis ___ ___ ___ ___ ___ ___ ___
4.
This is a technique used in data transmission where multiple antennas are used at both the sending and receiving ends allows multiple data streams to be sent and received at the same time, improving performance. ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
5.
The WIFI standard 802.11ax is also known as? ___ ___ ___ ___ ___ ___ ___
6.
This is a type of malware that is capable of spreading and duplicating on it own, without any human input. ___ ___ ___ ___
7.
This malware record keystrokes to capture sensitive information like passwords ___ ___ ___ ___ ___ ___ ___ ___ ___
8.
This malware displays unwanted advertisements on the user’s device. ___ ___ ___ ___ ___ ___
9.
encrypts a victim’s files and demands payment to unlock them. ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
10.
This is malware disguised as a legitimate software or file but contains malicious code. Once installed, it can steal data, take control of the system, or install other malware. ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
11.
a type of malware that attaches itself to legitimate programs or files. Once activated, it replicates and spreads to other systems, often causing damage by corrupting files or systems. ___ ___ ___ ___ ___