2
is a technique of extracting confidential information.
(a) phishing
(b) cyber stalking
(c) hacking
3. The protection of computer systems from theft or damage to their hardware is called
Answers
Answered by
0
Answer:
phishing
Explanation:
phishing is a technique of extracting confidential information
Similar questions
Math,
19 days ago
Math,
19 days ago
India Languages,
19 days ago
English,
1 month ago
English,
1 month ago
English,
8 months ago
Social Sciences,
8 months ago