Microsoft powerpoint? i think thats what this is asking
Answer:
This is a multicolinearity problem and the student should determine the variable(s) that cause(s) the problem and remove it.
Explanation:
This information means that there exists a linear combination between the independent variables. The problem might have developed due to multicolinearity producing almost perfectly linearly dependent columns.
This could also be as a results of single matrix created when the student use an incorrect indicator variables and included an additional indicator column which created linearly dependent columns.
Answer:
Text Editor
Explanation:
What the question implies is that, what tool will she need to create the website.
And the answer is a text editor; this is so because the other three options are web development languages used in developing a website but the text editor is where she'll write her line of codes to create the required website poll.
Example of usable text editors are notepad and notepad++ etc.
Answer:
Network scan
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.
A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.
Answer:
file, properties, options, general
Explanation: