What are the options and if it's meaning like when you save something it has .pdf .jpg or .doc after the title then it would be ".doc"
Answer:
See the components in explaination
Explanation:
In order to make it as IPv6, few key components should be supported, those components are given below:
The infrastructure must support the enhanced protocol StateLess Address Auto-Configuration (SLAAC).
Static addressing with DHCPv6, dynamic addressing with DHCPv6 and SLAAC are the methods used to configure the IPv6. The network administrator should able to understand and implement the IPv6 through the DHCPv6.
Other than the implementation, working of IPv4 and IPv6 are same. Therefore, the administrator need not to learn new information for its working.
As the IPv6 address length is 128-bit and purpose is for everything on line to have an IP address. It must allow the internet to expand faster devices to get internet access quickly.
The DHCPv6 is not supported by all windows. Therefore, network administrator should check the corresponding Operating system (OS) would support the DHCPv6 for IPv6.
The network administrator must have good knowledge and skills on the IPv6.
The above mentioned key components should be verified by the network administrator in order to support for IPv6 project with DHCPv6.
Answer:
The correct option is;
Content controls
Explanation:
Content controls are customizable controls that can be added to forms, templates and document that enable users to identify or preview the expected data that fills a given form field
Content controls can be in the form of instructional text that give users an idea of the expected format of the content of a given form field, such that the text disappears as soon as the user starts typing in their own text.
Answer: rootkit
Explanation:
Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.
Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.