Answer:
These are the software that you use a lot at home and at school. They are cheap but free from the bug as they are thoroughly tested. And they are easily available as well. Various examples are:
Word processors - These are used to write the memos, letters, and reports. an example is Microsoft word.
Spreadsheet- keep track of accounts. example, Microsoft Excel, Google sheet.
Database application - Keeping track of customer's records. Example Microsoft Access etc.
Desktop publishers- for creating business cards, posters, etc. Example-Microsoft Publisher.
Presentation software - for creating presentations example, Microsoft Powerpoint
Applications for Graphics- for making changes to the images, like Corel Draw
Applications for Web design - creating business websites, and personal. example. Dreamweaver.
Explanation:
Please check the answer.
Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.
<h3>What is downgrade security attack?</h3>
A downgrade attack is known to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.
Note also that the Downgrading of a given protocol version is said to be a key element of a type of a man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.
Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack
Learn more about Downgrade attack from
brainly.com/question/24304791
#SPJ1