Answer:
B. robotic process automation.
Explanation:
In the design of a new system, a company was able to uncover several processes that were typically rule-based, and which did not really require staff to control or handle.
Hence, the company chose to automate those processes using robotic process automation so they would no longer need to assign people to perform those tasks.
These are the steps you would take..
click on insert at the bar on the top of the document processor (Word,Google Docs ect.) >>Click table drag as many columns and rows as you need!
I hope this helps!
The rules of a programming language constitute its syntax.
Answer: Geotagging was enabled on her smartphone
Explanation:
The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.
Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.
In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.
<span>The correct answer here is Hallucinogen.
Technically all drugs one way or another distort the perception of reality and thought processes but hallucinogens are especially potent in that regard. Hallucinogens are those agents that can cause, among other things, hallucinations and changes in consciousness, emotions and thoughts. LSD is maybe the most known representative of the hallucinogens. </span>