Computer Science, asked by vagisha76591, 10 months ago

Fill in the blanks (a) ______________ often directs users to a fake website whose look and feel are almost identical to the actual website. (b) Undesired or illegal email messages are often known as ______________. (c) The protection of internet connected systems including hardware, software and data from cyber attacks is termed as _____________________. (d) A __________________ is a form of malicious software program which can corrupt or destroy systems or data.

Answers

Answered by riyamenon123
31

Answer:

a) phishing.

b) email spam.

c) cyber security.

d) malware.

hope this helps

pls mark as brainliest

Similar questions