For the following questions answer them individually
To change selected text to all capital letters, click the change case button, then click
A person who used his or her expertise to gain access to other people’s computers to get Information illegally or do damage is a……..
………..is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.
A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called —