Computer Science, asked by priyompro, 5 hours ago

A. Fill in the blanks: i. i. iv. V. has the potential to cause serious harm to a computer system. A threat can be and Uses computer networks and security holes to replicate itself program can erase your hard disk. Computer viruses were first widely seen in the late Crime conducted with internet called is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. File backup and System image are two methods vi. vii. viii. Page 10​

Answers

Answered by pratyushrahinj
0

Answer:

CROP ONLY ONE QUESTION

YOU WANT TO SEE THE ANSWER THEN

CLICK THE BRAINLEIST TO SEE THE ANSWER

Similar questions