Answer:
with the power button or do the sleep or shut down
and by the type of computer
Explanation:
sry if its wrong
have a good day:)
-XxMissNobodyxX
Answer:
They acknowledge the source of a quotation, paraphrase, or summary; and (2) They provide explanatory comments that would interrupt the flow of the main text.so its B
A virus or malware appearing/pretending to be a legitimate program is called a Trojan.
Answer: Geotagging was enabled on her smartphone
Explanation:
The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.
Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.
In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.