I don't know if this is on your list, but I know for a fact that the Nintendo 64 system (or N64) has a 64-bit architecture.
What do you need help with?
Answer:
Phishing
Explanation:
Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft
Answer:
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.