Answer:
Active Directory
Explanation:
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Active Directory categorizes objects by name and attributes. For example, the name of a user might include the name string, along with information associated with the user, such as passwords and Secure Shell (SSH) keys.
Card
......... ......... ........
Answer:
Option a: Trojan
Explanation:
A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.
However, Trojan cannot be replicated in the infected computer.
Answer:
A. Fetch.
Explanation:
The fetch-decode-execute process of simply the fetch-execute process of the CPU are stages the CPU follow to process information and the switch state or shutdown.
The stages of this process is implied in its name, that is, the stages are fetch, decide and execute.
The fetch stage retrieves the next instruction from the memory.
The decode stage converts the clear text instruction set to electronic signals and transfer it to the appropriate registers.
The execute stage is the action carried out in the arithmetic logic unit.
Answer:
i think its d sorry if i am wrong