Answer:
D.Custom
Explanation:
When you select Custom installation, all Compulsory subcomponents and products are installed, but the Optional and Recommended sub-components and components can be installed selectively on a product-by-product basis for the licenses selected at install time. It also provides the feature to store it in your desirable disk in the hard drive.
Answer:
A. Spoofing
Explanation:
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.
Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take
Answer:
10
Explanation:
num1=3 and num2=2
num3=myproc(num1)+myproc(num2)
myproc(num1) results 6
myproc(num2) results 4
when we add both e get 10
AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.
<h3>
Artificial intelligence, machine learning, and malware</h3>
Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.
Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.
Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.
Learn more about malware here:
brainly.com/question/399317