Its either called an HDD or an SSD
Answer:
Phishing
Explanation:
Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.
The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c
Answer:
absolute cell referencing
Explanation:
Excel has an A1 reference style, which means that the columns are called letters A to XFD and the rows have numbers, 1 to 1,048,576. The total number of columns in Excel 2007 is 16384.
A cell can contain a value, formula or constants. A formula begins with a sign = (equal). You can use values from other cells in your formula. To use another value, create a reference to the cell that contains the value you want to use in your formula.
When you copy a cell that contains a relative reference and paste it into another cell, the relative reference changes
When you copy a formula that contains relative references, the reference changes when you paste it into another cell.
How much the reference changes in relation to the position of the copied cell and the position of the new cell in which the formula is pasted. Excel uses relative references by default.
Instead, an absolute reference in a formula remains the same if it is copied to another cell.
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program. With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
1.D - Field
2.C - Field Names
<span>3.A - Format the table
</span><span>4.C - Blank Fields Or Records</span>