Computer Science, asked by alitannaji17, 8 months ago

NAME THEM
a) Software used to corrupt files and reduce the system performance_.
b) This is an intrusion threat done by sending fake emails or instant messages_.
c) This is like a secret code_.
d) These attributes are unique for a person_.
e) To decipher and crack the encrypted code_.

Answers

Answered by Fionaakhtar
6

Answer:

a) Data corruption

Explanation:

b) Phishing

d) ID

e) Caesar cipher

I only now these

Answered by mmdrajesh
0

Answer:

a)Data corruption

b)Phishing

c)Password

d)ID

e)Caesar Cipher

Similar questions