Respuesta :

Answer:

The answer is "about the same".

Explanation:

E-mail attachments were intended to trigger a user computer attack. Attachments could be camouflaged like papers, PDF, electronic files, or voicemail in such phishing websites. The carefully planned malicious email campaign may look forward to recording the number of replies or through clicks as a legal business email campaign.