Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1
. You have got a bunch of digital holiday photo you want to put into a slide show. What the quickest method?
Options: a. Apply a multiple-picture layout to several slides, and use the clipart icon on the slides to import your picture b. On the insert menu, point to the picture, click from file, and select your picture in a group for each slide c. On the insert menu, point the picture and click new photo album d. All of the above
When a series RLC circuit is operating at its resonant frequency:
Options: capacitive reactance is greater than the inductive reactance, inductive reactance is greater than the capacitive reactance, inductive reactance is equal to the capacitive reactance, the difference between inductive and capacitive reactance is equal to the resistance
Options: One of the important parties in USA, the political parties which has no definite principles, the political party which changes with the change in the times and circumstances in the country, All of the above
Options: (A)It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations (B) Computational procedure that takes some value as input and produces some value as output. (C) Science of making machines performs tasks that would require intelligence when performed by humans (D) None of these