A. handling complex computation
B. medium for effective storage
C. processing data at a phenomenal speed
D. vulnerability to attack
Correct Answer:
Option D – vulnerability to attack
A. handling complex computation
B. medium for effective storage
C. processing data at a phenomenal speed
D. vulnerability to attack
Correct Answer:
Option D – vulnerability to attack
Copyright warnings! Do not copy.