Answer:
test the installed cable
Explanation:
Based on the information provided within the question it can be said that the next step that Amy should take would be to test the installed cable. One of the most performed tests is called an Insertion Loss test. This is done with light source and power meter (LSPM) or optical loss test set, and tests to make sure that the information is travelling through the cable correctly and that no loss occurs in transit.
The top one is C. I can't answer the others lol.
Here, we are required to suggest 4 new features for Microsoft word/excel.
The features include;
- An in-built speech-to-text system.
- An in-built paraphrasing tool to avoid plagiarism
- A "start where you stop feature" even when the project is not saved.
- An offline "picture-to-text" conversion mechanism.
First, An in-built speech-to-text system would come in handy in enhancing the speed of project completion in Microsoft word/excel.
Secondly, an in- package plagiarism checker can be integrated alongside a paraphrasing tool to help improve the uniqueness of projects on Microsoft word/excel.
In addition, some old generation computers are still in use. As such, integration of a "start where you stop" feature even when the project is not saved will come in handy to sustain the progress of projects in occasions of unplanned interruptions.
And lastly, although "picture-to-text" feature is present in Microsoft word/excel upon online access. The integration of an offline version of this feature would be a good new feature for Microsoft word/excel.
Read more:
brainly.com/question/18990975
Answer:
4 table elements in computer & technology are:
- Hardware
- Software
- Data
- User
The type of attack that the attacker is performing is a dictionary attack.
<h3 /><h3>What is a dictionary attack?</h3>
A dictionary attack is a way of breaking right into a password-protected computer, community, or different IT useful resource with the aid of using systematically coming into each phrase in a dictionary as a password.
A dictionary attack also can be utilized an try to discover the important thing vital to decrypt an encrypted message or document.
The missing information in the question:
ciphertext-only
brute force
dictionary
replay
Therefore, The type of attack that the attacker is performing is a dictionary attack.
Learn more about dictionary attack:
brainly.com/question/14728015
#SPJ1