Answer: 42 is the answer to everything and just remember, Don,t panic.
For i am the hitch hikers guide to the galaxy.
Explanation:
Answer:
Phishing
Explanation:
Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.
Phishing could be carried out via emails, telephones, or even text messages.
In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.
Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.
It is letter D. but i might be incorrect, please contact your teacher for further information. sorry if I got your answer wrong... :(
<h3>Answer : B.responsible for the logical order of processing and converting daya</h3>
<h3>Reason</h3>
As i said bro, in CPU there are ALU and CU where ALU is to do mathematics problem and CU where its to processing, converting data. CPU is like the brain of computer. But it can't be the input, the input can get through hardware, not CPU.