A. a whale attack i think
Answer:
1.Spelling checker
2. Order of mathematical operations .
3. Series
4. Pick from list
5. Sum Function
6. Active Cell
7. cell
8. Accounting format
9. Format
Explanation:
Answer:
explanation below
Explanation:
Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected. These controls are not only used by managers but can be exercised by selected users.
These controls must be put in place to cover all forms of information security, physical security and classification of those information.
Answer:
"Deadlock" is the right solution.
Explanation:
- A deadlock seems to be a circumstance where certain (two) computer algorithms that share a similar resource essentially prohibit each other during manipulating the asset, leading to both programs withdrawing to operate.
- This occurs when multiple transfers or transactions block everyone by maintaining locks onto assets that every other activity also needs.
So that the above is the correct answer.