I beleive all of the above for question one
Answer:
DM me I have an answer set up but it won't let me here because it's "too long" hope to here back from you! (sorry about this Brainly has been acting up on me lately!!!!!)
Explanation:
Monitor
Printer
Headphones
Computer Speakers
Projector
GPS
Sound Card
Video Card
Braille Reader
Speech-Generating Device
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.