Answer:
Option (c) is the correct answer of this question.
Explanation:
RAM (Random Access Memory) It is a type of computer memory which can also be retrieved and adjusted in either sequence, usually still had to preserve operating memory and bytecode.
It is a type storage device, and maintains the data used when the device is operating.RAM makes file access more frequently compared with certain digital storage types.
<u>For Example</u>:- PCs, tablets, smartphones ,printers etc.
Other options are not related to the given scenario.
Since Greg wants to become an advertising and promotions manager, he needs to at least gain a (B) bachelor’s degree level of education, since generally, this educational background is expected from individuals who wishes to work in an entry-level position in the field of advertising.
One of the skills that he also needs to develop is (C) communication skills, because he would have to be able to communicate in both written and spoken to develop the advertisements according to the client’s desires.
Answer:

Explanation:
Given
Power at point A = 100W
Power at point B = 90W
Required
Determine the attenuation in decibels
Attenuation is calculated using the following formula

Where
t and
t


Substitute these values in the given formula




<em>(Approximated)</em>
Answer:
User roles and access authorization
(Explanation of this question is given below in the explanation section.
Explanation:
As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.
The following problem can be with that account
- Unauthorized user access and privileges
The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.
- The firewall may be disabled to detect the malicious script
The firewall should be enabled to detect such types of attack from unauthorized access to the system
May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.
Answer:
C) /etc/updatedb.conf
Explanation:
The locate command actually uses the configuration file located at /etc/updated.conf.