Either A or B. I would go with A but It can actually be B
Answer:
D is your answer because I'm an expert
Answer:
Second one
Explanation:
evaluation of ur problems
Answer:
<h2>a) computer software </h2>
<h2>b) flash drive</h2>
<h2>c) Latin "putare" </h2>
<h2>d) Hardware</h2>
<h2>e) software</h2>
hope it's helpful ✌
Answer: as a whale attack
Explanation:
A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.
Based on the explanation above, the attack called into is a whale attack.