A. handling complex computation
B. medium for effective storage
C. processing data at a phenomenal speed
D. vulnerability to attack

Correct Answer:

Option D – vulnerability to attack

Copyright warnings! Do not copy.