Hindi, asked by ks993209, 1 month ago

2
is a technique of extracting confidential information.
(a) phishing
(b) cyber stalking
(c) hacking
3. The protection of computer systems from theft or damage to their hardware is called​

Answers

Answered by hemanbijarnia123
0

Answer:

phishing

Explanation:

phishing is a technique of extracting confidential information

Similar questions