Answer:
Documents: For composing letters, flyers, essays, and other text-based files (similar to Microsoft Word documents)
google sheets logo Spreadsheets: For storing and organizing information (similar to Microsoft Excel workbooks)
google slides logo Presentations: For creating slideshows (similar to Microsoft PowerPoint presentations)
google forms logo Forms: For collecting and organizing data
google drawings logo Drawings: For creating simple vector graphics or diagrams
Explanation:
The correct answer is b folder
The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.
<h3>What is DNS poisoning?</h3>
In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.
Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.
Learn more about hacker from
brainly.com/question/24956493
Answer:
Development task is the correct answer to the given question.
Explanation:
The database administrator is responsible for managing the database management system . The overall security of the database is depended on the database administrator.
The Development task include the following function
- Verification of the data model that is used by the database management system .
- Check the user input it means validating the data.
- Defining the overall requirement to create the model.
- Providing backup when the data is loss .
So the Development task is the correct answer.
<span>The answer is letter B. An arrangement of directions and related documentation that instructs a PC or how to play out an undertaking or it can mean all the product on a PC, including the applications and the working framework. I hope the answer helps. </span>