Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Aerial Lifts,
Vertical Masts and Hydro Platforms,
Telehandlers,
Excavators,
Skid Loaders,
Backhoes,
Cranes,
Air Compressors.
If It was helpful, can you make me brainliest please?
<span>it is stored on your clipboard and you can get to it by pressing ctrl+c</span>
Answer:
Fault tolerant system
Explanation:
Fault tolerance is the property that keeps a system operating properly in the event of a failure of one of the components within the system
A fault tolerant system enables the system to continue its operation possibly at a reduced level, rather than having the whole system breakdown.
A good security expert understands the need for fault tolerance in a comprehensive security system, as the absence of this can lead to serious security breaches once the whole system is down.
Answer:
Mail merge lets you create a batch of documents that are personalized for each recipient. For example, a form letter might be personalized to address each recipient by name. A data source, like a list, spreadsheet, or database, is associated with the document.