Answer:
Search key, a, s, d, f, g, h, j, k, l, : and ;, ¨ and ´, and the enter key.
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information
1. Monitor : used to show the system.
2. cpu : the main part of a pc.
3. mouse : use to move cursor.
4. keyboard : helps in typing.
5. ups : make system not to sleep in case of no electricity for 15-20 minutes.