Answer:
Henry, an administrative assistant, is taking an advanced Word computer program class through an adult school program.
Explanation:
Answer:
Explanation:
I am attaching the table as an image with updated table containing required information for the following WAN technologies.
T1/DS1 => Digital Signal 1 (T-Carrier 1),
T3/DS3 => Digital Signal 3 (T-Carrier 3),
OC3 (SONET) => Optical Carrier 3 (Synchronous Optical Networking),
Frame Relay,
ATM => Asynchronous Transfer Mode,
MPLS => Multi-protocol Label Switching,
EPL => Ethernet Private Line.
Although you have mentioned most of the information yourself, there were some wrong data in it. So I have updated them with correct information in the attached table.
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).
Answer:
Number of strings = (10, 2)×(8,3) = 2520
Explanation:
The number of possible combinations for taking two 0's is C(10, 2)
It remains 8 Positions
The number of possible combinations for taking three 1's is C(8,3)
So there remains 5 spots