Answer:
the options to the question is:
a.In the introduction
b.In the body
c.In the conclusion
d.In the post script
Explanation:
The answer is A.
The letter would be better suited to have the request placed in the introduction as the introduction will give a brief of what the letter is all about.
The request cannot be in the body of the letter as the body of the letter is structured to contain the details about the request.
The request cannot be in the conclusion as the conclusion part of the letter is the ending part and it is more of a summary, rounding off the letter.
The request cannot be in the Post Script section of the letter as the post script is used to add additional information or detail to a letter.
Answer:
1) select the template option from the presentation wizard
2) select the background of your slideshow
3) assign animation to your slide
4) click create presentation
Explanation:
not gonna lie, this was very confusing
hope it helps
The Web is just one of the ways that information can be disseminated over the Internet
Answer: A. passive attacks
Explanation:
Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.
A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.
Methods of carrying out passive attacks.
•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.
•Dumpster driving: Attackers or intruders search for information from discarded computers and
other gadgets, those information can help to attack a network.
Answer:
true
Explanation:
web application is a software or program which is accessible using any web browser.