<span>select the New Slide option from the Insert menu</span>
Answer:
ok done we will try
BTW have a nice day enjoy your day Stay blessed stay happy stay strong
Answer:
- RFID tags in shopping mall.
- Browsing the internet.
- Mobile phone calls
Explanation:
Radio frequency identification tag (RFID) in a device that holds personal information of a user electromagnetically. it is used in shopping mall, installed in the shopper's phone or a card, in which all payments are done automatically.
The internet is a global network of devices. With a subscription to a internet service provider, a user can surf the internet at any time of the day.
Mobile phones are portable devices, procured by a user for on-the-go calls. This cell phones have databases with information of cell tower connections, for easy switching for flexible but quality call adaptation.
Answer:
Option c is the correct answer for the above question.
Explanation:
- The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
- The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
- It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
- Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.