Answer:
1. C.operating system
2. A.applications
Explanation:
1. The Iaas is the infrastructure as a service, and storage, server, and network are the infrastructures. However, the Operating System is the platform, and hence it is the correct option for the first blank. We need to understand the exact meaning of the IaaS, PaaS and the SaaS as well as MaaS, to better understand cloud computing.
2. In the second case, we have been asked about the option that is not being covered by the PaaS, and Paas stands for the platform as a service. And the interface, storage, and virtualization is the platform whereas the Applications is an example of software. And it is being managed by SaaS, Hence, the correct option is A. Applications.
First slot is Virtual, and the second one is Augmented, as AR (augmented reality) is stuff like HUD (heads-up display), which can be used to display heart rate, calories burnt etc. in your peripheral vision.
Routing is process of selecting and establishing the routes that data packets take on their way to a particular destination (specific IP addresses). Broadcasting on the other hand is the simultaneous transmission of the same message to multiple recipients. In contrast to routing, broadcasting lacks the ability to direct packets to a specific address. When it comes to security, routing is not necessarily more secure than broadcasting. Without goof security protocols other users can read messages even if they aren't the recipient of the packet.
Answer:
Video camera
2) Microphone
3) Speakers on the device being used.
4) Internet connection
Explanation:
pls mark brainliest
Answer:
honeypot.
Explanation:
Okay, let us first fill in the gap in the question above. Please, note that the capitalized word is the missing word.
"There are number of issues to consider when composing security policies. One such issue concerns the use of security devices. One such device is a HONEYPOT , which is a network security device with characteristics of a decoy that serves as a target that might tempt a hacker''.
In order to make the world a safer place to live, there is a need for good and efficient Security policies. These policies are set by the authority or the government (legislative arm and executive arm of the Government) and with this the Judicial arm of the Government interprete and make sure that the policies are enforced.
In order to enforce the security policies and with the advancement of science, engineering and technology, devices are being made or produced to help in enforcing security policies and one of them is the use of HONEYPOT.
The main use or advantage of honeypot is to track hackers or anything related to hacking.