2 I think because 2 I think is binary I’m sorry if this is wrong
Answer:
There are two ways to insert the new column or row in the table.
Explanation:
<u>Method I</u>
i. Select the cell where you want to add a new row or column,
ii. Click on Home Tab
iii. Find insert button in Cells Group.
iv. Click on Insert Row or Insert Column button.
By following above mentioned steps we can add a row or column in Excel sheet.
<u>Method II</u>
i. Select the cell where you want to add a new row or column,
ii. Right Click on the selected Cell.
iii. Find Insert Button in drop down menu and Click on Insert.
iv. There are four options in POP menu, choose Entire Row or Entire Column to insert row or column.
Answer:
1. B
2. D
3. C
4. A
5. B
Explanation:
1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."
2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.
3. Virus is a software program that can infect, damage and disrupts the whole computer system.
4. To protect the whole computer system, the software utility which is needed is an Anti-virus.
5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.
C. Both serially and Perullo
Answer:
True
Explanation:
Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.
Rootkit tools:
1. Keyloggers
2. antivirus disablers
3. password stealers
4. banking credential stealers
5. bots for DDoS attacks