Just wanna let you know I could be wrong but I think 4 passes
To multiply all the numbers in column A by cell C2, add $ symbols to the cell reference like this: $C$2, which you can see in the example below. Using $ symbols tells Excel that the reference to C2 is “absolute,” so when you copy the formula to another cell, the reference will always be to cell C2.
Answer:
4. A Denial of Service attack (DDOS attack).
Explanation:
A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.
In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.
Thus, regular users are not able to access their services.
Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.
Answer: D) Identifying GUI's for a particular requirement
Explanation:
Traceability of requirements is helpful except identifying GUI's for a particular requirements as, traceability in project management describe the relationships between two or more element throughout in the development process and outline the relationship between the customer requirement by traceability matrix. And the requirement of traceability is so important because it creating a downstream flow of software and test cases in software requirement but not helpful in GUI identification.