Answer: C)report the status of individual computer users
Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.
Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)
The most serious security threat to Bluetooth-enabled devices is
, which occurs when a hacker gains access to the device and its functions without the owner's consent.

Answer:
Umm was there supposed to be a picture????
Explanation:
Hope you have a wonderful Christmas Eve time with your family!!❄️
Answer:
C
Explanation:
<link rel="stylesheet" type="text/css" href="syb/syb.css" title="stylesheet"/>
The above code is self explanatory. All others have wrong rel or title. Title is always stylesheet, and rel as well stylesheet as well as href is external css file which we are loading, and text/css is always the type as it is the css. None of the other has this syntax. And hence this is the right answer.
Answer:
Im pretty sure Domain name system but dont trust me
Explanation: