A.
Fill in the blanks.
1. Cyberspace facilitates___
between people who are far away from each other.
2. When a person is followed and pursued online, it is called___.
3.____
are malicious programs that infect other programs in computers.
4.____is an example of a cybercrime in which the computer is the target.
5.____
and____
are considered valid and accepted under the new cyber laws.
Answers
Answered by
2
Explanation:
- communication
- influencer
- Malwares
- Email hacking (not sure)
- Creative trolling, Critical acclaim.
Answered by
6
1) Communication
2) Influencer
3) Malwares
4) email hacking
5) Creative trolling, critical acclaim
Similar questions