Computer Science, asked by alitannaji17, 7 months ago

MATCH THE FOLLOWING
a column
a) Virus
b) Illegal access
c) Username
d) Voice
e) Encrypted language
f) Norton
g) Firewall
h) Fingerprint
i) Phishing
j) Hardware threat
b column
a) Back-up of files
b) Instant messages
c) Security program
d) Hacking
e) Sensor
f) Software threat
g) Antivirus software
h) Defense departments
i) Password
i) Texture​

Answers

Answered by pratyush2750
2
Thank u ma’am for your anniversary
Similar questions