These units are useful for carrying out the specific functions and therefore are linked to the pc externally. These peripheral units enable the pc to work according to the user necessities by feeding data in and out of the computer. Peripheral units are as follows:Even though the hacker is linked, however, They can be vulnerable simply because we c