Answer:
Sound card
Explanation:
In computer or laptop music or sound files are stored in digital form. Sound card is the the device that is used to convert the digital form of music into analog to produce the signal that is compatible with speaker or microphone.
If the speakers are not working on the laptop, means there is no sound produced on speakers. It means that sound card is not working properly.
Answer:Obscurity
Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.
The functioning of the security through obscurity(STO) works by hiding the flaws and errors related to security of the operating system.Thus , Signe is willing to use obscurity system.
Answer:
Agile/adaptive methods.
Explanation:
The user has just decided to join a firm and will also be accountable to determine whether that system development technique that group uses to establish the latest software for a significant medical distributor to his position as just a lead analyst.
After that, he consumes a week for the purpose to understand his group members for reason to know their strengths and weakness and how would they work under pressure.
So, the following method is required for him to understand about the disadvantages of each of them.
Answer: Source
Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.
The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .
The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.