I would say strong use of multimedia.
Answer:
The attackers used the code injection
Explanation:
<em>Because, the HMTL5 allows data and code to be mixed together, making code injection attacks possible. </em>
Answer:
Option C, or the CPU.
Explanation:
The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.
Phone capabilities and fitness monitoring
A disk optimization program, but they're probably looking for defragmenting program.