Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Answer:
light year
Explanation:
Its is equal to 9,500,000,000,000km
Answer:
David can apply filter to the data in order to show only records that meet the criteria.
Explanation:
- Filter is a very helpful option that displays the records that you want to view, hiding rest of the unwanted records.
- Sometimes you want to extract and view only the records that match a specific criteria instead of viewing all the records.
- For example in the CUSTOMERS table which contains names, addresses, countries of customers. There are several customers from different countries but you only want to view the customers from Spain. So you can use filter feature to view all the customers from country Spain.
- In MS Access you can apply filters using Sort & Filter group in the Home tab by selecting the desired column. In SQL, WHERE clause can be used along with SELECT to for filtering and extracting certain records. SELECT will select the records from the table and WHERE clause will specify the criteria to select the certain records.
Answer:
Windows\System32\drivers folder.
Explanation:
Eric operates on such a computer which has some failure on system's driver. Although the specific system may not be operational, he will locate the system driver title. Inappropriately he has no Connectivity to the internet.
Windows\System32\drivers directory could move to him to show the file of the system driver. Thus, the following answer is correct according to the given scenario.
I would go with A) The Internet
I hope that turns out well for you. Good luck! (: