Answer:
Brute Force attack.
Explanation:
A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.
A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.
Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.
An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.
The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.
Answer:
View
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.
In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;
I. View Mode
II. Print Mode
III. Drift Layout
The Microsoft Word developers has made it easy for their users to automate the tasks used frequently through the creation and execution of macros.
Basically, macros comprises of commands and instructions which may be grouped together as a single command to automatically execute a task. You can locate the Macro feature in the View tab of Microsoft Word.
Answer: keeps confidential documents secure,
displays a GUI, allocates the computer's resources, and retrieves files
Explanation:
The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.
The answer is Tablets. It is a portable personal computer, generally with a mobile operating system and LCD touchscreen display processing circuitry, and a rechargeable battery in a single thin, flat package. It is bigger than smartphones.