NAME THEM
a) Software used to corrupt files and reduce the system performance_.
b) This is an intrusion threat done by sending fake emails or instant messages_.
c) This is like a secret code_.
d) These attributes are unique for a person_.
e) To decipher and crack the encrypted code_.
Answers
Answered by
6
Answer:
a) Data corruption
Explanation:
b) Phishing
d) ID
e) Caesar cipher
I only now these
Answered by
0
Answer:
a)Data corruption
b)Phishing
c)Password
d)ID
e)Caesar Cipher
Similar questions