Answer:
SYN spoofing attacks.
Explanation:
The Spoofing attack is used to access the personal information it is distributed the viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.
The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack is distributed across the Internet also it is detectable
Answer: Social media
Explanation:
Social media is defined as the group of the internet based various applications that basically build on the foundation of technological and ideological of the web 2.0. It basically allow the exchange of the user content and creation.
It is the most flexible platform that enable the users with the huge experience. It is also known as free and open source platform. It basically contain the various content that are algorithm driven and machine learning.
Answer:b)Reserve Room, Enter Contact Information, Enter Reservation Detail
Explanation: The use case is described as actors , actors goal, usage of use cases, units of scope and initial point and terminating point of use cases .
The situation mentioned in the question will take place for the reservation of the room through the instances in the form like filling the contact details for the identification , filling out reservation information as well for getting the knowledge about the room requirement by the person.
These details help in reaching out the particular person if required, number of days he wants to book the room,any extra facility he would like to have etc. After these detail filling activity the room can be reserved successfully.Thus , the most appropriate option is option (b).
Other options are incorrect because room reservation cannot be done without any formality as mentioned in the question and entering contact detail and reservation detail one by one.
IaaS
Laas is Framework as a help are online administrations that give significant level APIs used to dereference different low-level subtleties of basic organization foundation like actual registering assets, area, information dividing, scaling, security, reinforcement and so forth