Answer:
A. Slides can be easily added, deleted, copied and reorganized.
D) All of the above are corect
Answer: Stealth scanning technique
Explanation:
Stealth Scanning technique includes the following steps:
1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.
2. The port is assumed to be in closed state if the RST packe t is sent from the server.
3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.
I'm assuming hardware.
Remember, Hard = Physical.
If that's not it, try peripherals.
Answer:
Table function
Explanation:
The table function can also be used to compare between items. The items can be arranged in columns and the features tonbe compared can be placed in columns. With this one can make comparison between the items.