Segundo o padrão da National Institute of Standards and Technology a alternativa correta é a letra E) 400 músicas. Segundo o padrão disposto acima, dois Giga Bytes equivalem à dois mil Mega Bytes, assim, se cada música tem exatos 5MB, podemos chegar ao total de músicas que podem ser gravadas em um PenDrive de 2GB livres do seguinte modo :


A evolução da microeletrônica possibilitou uma capacidade de armazenamento cada vez maior a cada ano. O desenvolvimento de novas tecnologias na área permite também que os produtores possam produzir músicas, fotos e vídeos com cada vez mais qualidade (consequentemente mais pesada).
Answer:
By supplying a variety of charts and graphs to present the information in best way.
By tracking and analyzing the data
By conveying large amount of numerical data in more understandable format.
Explanation:
You need to know the limitations of Excel software. You will find that it does not support more than 3 variables while analyzing. However, if you use analytic software like Tableau and Microsoft Power BI then you can use a lot number of variables. And this is done through graphs and charts, and the other variables apart from x, y, z are the colors, shades. etc. Even color alone can add a good number of variables, and hence you can understand. Thus, you will be able to query better. Queries become better if you have more variables. And charts and graphs always present the information in the best way/ Also you can track and analyze the data. And through it conveying a large amount of numerical data in a more understandable format is made possible, and this is definitely quite helpful. Hence, all of the options mentioned above are helpful. But they do not do complex calculations and complex queries in fact.
Answer:C) PEAP(Protected Extensible Authentication Protocol)
Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.
Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).
Answer:
Social Engineering Attack
Explanation:
The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.
read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering
Lmk if this helps! :)
spec sheet is a document that summarizes the performance and other technical characteristics of a product, machine or component.