Hello! The slide transition helps with the transitions of slides and the animation helps out with the words appearing on the screen in a more creative way. Therefore, C and D are out. The slide layout is the part where if you click on it, slide designs are shown for you to choose from. The shapes can be used for design, but it doesn't help if you're looking for the design of a slide. The answer is A: slide layout.
Answer:
DNS poisoning
Explanation:
This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.
Answer:
1. Data Cleaning
2. Data Integration
3. Data Selection
4. Data transformation
5. Data Mining
6. Pattern Evaluation
7. Knowledge presentation
Explanation:
The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:
Step 1. Data cleaning: this involves the elimination of inconsistent data.
Step 2. Data integration: this involves the combination of data from multiple sources.
Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.
Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.
Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.
Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.
Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.