Answer:
Option C
Explanation:
The museum authority can easily automate the process of storage of data on cloud once the document is prepared.
This shall help is easy access to data to all and will also prevent issues arising because of non storage of data or some form of mis-happening leading to data loss.
Step 1.
Purchase Requlsition
Step 2.
Requisition Review
Step 3.
Solicibation process
Step 4.
C'valuation and process
Step 5.
Order Management
Step 6.
Involve approvals and disputes
Step 7.
Record Keeping
Explanation:
Hope it help
Answer:
Explanation:
Because the virus disguises it self as something you are trying to download, then it attackes your device
Answer:
PAP authentication method
Explanation:
PAP known as Pass word authentication protocol Basically, PAP works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination, so not recommended for applications.
Answer:
security hacker
Explanation:
security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.
tell me if this is wrong :)