2
is a technique of extracting confidential information.
(a) phishing
(b) cyber stalking
(c) hacking
3. The protection of computer systems from theft or damage to their hardware is called
Answers
Answered by
0
Answer:
phishing
Explanation:
phishing is a technique of extracting confidential information
Similar questions