________ software is used to block unauthorized access to your computer.
Fill in the blank(s) with correct word
Question 2
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
Fill in the blank(s) with correct word