The answer is D
<span>D) It allowed computers to be smaller because the chip allowed for the creation of computer components with varying capabilities.</span>
Hello <span>Sydney2640 </span><span>
Answer: To specify grouping and sorting for a report, click the group-and-sort button on the design tab in layout view.
Hope this helps
-Chris</span>
The CPU reads machine instructions from program memory and executes them.
<u>Explanation:</u>
<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.
a. Cindy may learn the difference between these two techniques used to create a malware attack:
- through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
- through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.
b. Here are some common suggestions;
- Never open attachments from strange email addresses.
- install a paid antivirus software.
- be mindful of websites with too many ads.