<span><span>Click the playlist you want to export, and then click Export Playlist to File on the File menu.
</span><span>In the Save As dialog box, click the folder that contains the playlist you want to export.
</span><span>In the File name box, type a descriptive name for your playlist, and then click OK. This file is saved with a .asx file extension.</span></span>
Answer:
MAPAZOQHGKHWHMLITMIAKHPBASDGMCDHROCAFKRAFOFANPBLZY
Explanation:
To make it create a matrix with the letters provided without using the letter J. Then organize the message to be encrypted in pairs omitting the spaces and using a letter X if two letters are the same or if you have and an odd number of letters. Select each pair of letters to encrypt them one pair at a time, using the matrix paint a rectangular box around the letters to code them select the opposite letter in the rectangular box.
Answer: A. passive attacks
Explanation:
Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.
A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.
Methods of carrying out passive attacks.
•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.
•Dumpster driving: Attackers or intruders search for information from discarded computers and
other gadgets, those information can help to attack a network.
Lag and loops because some ads are programmed to work that way.
idk im not a professional
Answer:
The four main functions of a computer are to:
- take data and instructions from a user
-process the data according to the instructions
- and display or store the processed data.
These functions are also referred as the input function, the procedure function, the output function, and the storage function.
Explanation: