For the following questions answer them individually
Codes consisting of lines of varying widths or lengths that are computer-readable are known as
Which of the following is a program that uses a variety of different approaches to identify and eliminate spam ?
……………are attempts by individuals to obtain confidential information from you by falsifying their identity.