I phone because it stores things hil sends out things to other people
Answer:
The physical components that a computer is made of
Explanation:
as u can see these components and u can repaire these components if they got damaged
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.
Answer:
A: used by ISP's to filter out email SPAM
C: a way to help an individual focus on best choices when deciding what to watch or buy.
Explanation:
Collaborative filtering uses a community-based approach to filter spam. It works by collecting numerous email users from around the world. By doing this, it becomes possible for users to flag emails that are spam and those that are legitimate.
Also Collaborative Filtering is one of the most efficient techniques for building a system that can help a user when it comes to recommending best choices based on information from a large number of users.
Answer: defeat the dragon? I think