A. Fill in the blanks: i. i. iv. V. has the potential to cause serious harm to a computer system. A threat can be and Uses computer networks and security holes to replicate itself program can erase your hard disk. Computer viruses were first widely seen in the late Crime conducted with internet called is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. File backup and System image are two methods vi. vii. viii. Page 10
Answers
Answered by
0
Answer:
CROP ONLY ONE QUESTION
YOU WANT TO SEE THE ANSWER THEN
CLICK THE BRAINLEIST TO SEE THE ANSWER
Similar questions