Answer:
The answer is "option D"
Explanation:
Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:
- In option A, It is a malware that is also known as Trojan.
- In option B, It is malware, not a virus but the malware includes viruses.
- In option C, It doesn't install spyware on the user's computer.
- In option E, It doesn't use for enterprise networks to penetrate.
Answer:
2. Marketing, communication or advertising
Explanation:
Option B
Synchronous replication modes of replication requires a very low latency network connection and ensures data remains in synch with zero data loss in the event of a failure at the source site
<u>Explanation:</u>
Synchronous replication, information is replicated to a subsequent remote place at the identical period as fresh information is implying generated or renewed in the original datacenter. Actually, both master and target roots endure effectively synchronized, which is vital for triumphant crash restoration.
In the circumstances of synchronous replication, this indicates that the write is deemed ended barely when both local and isolated warehouses approve its fulfillment. Therefore, nullity data failure is assured, but the overall execution is regulated down.
The value of total resistance of resistors connected in parallel is calculated through the equation,
R = 1 / (1/R1 + 1/R2 + 1/R3 + 1/Rn)
Substituting the known values,
R = 1 / (1/2 + 1/6 + 1/10)
R = 30/23 ohms
The formula for power with the use of resistance and voltage is,
P = V² / R
Substituting,
P = (100 V)² / (30/23 ohms)
P = 7.67 kW
Thus, the answer to this item is letter C.
It’s says the same thing to me too!