Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
Answer:
Wearable technology
Explanation:
An example of using the Internet of Things (IoT) to deliver innovative cloud-based solutions to customers is the wearable technology that provides customers with on-the-spot personalized experiences.
Answer:
Data acquisition should follow a detailed collection plan that is set in advance.
Explanation:
The process of collection of data over computer with the help of electronic sensors is called data acquisition. The can be related to voltage, current, temperature etc.
For example
Data collection with the help of sensors to monitor weather conditions is an example of data acquisition. In this process data has been gathered on already planned format. Each column or row of data will be helpful to predict the weather condition such as, rain predictions, earthquake prediction etc.
That's why to collect this type of data, collection plan should be set in advance to gather relevant information with the help of data.
Answer:
The answer of the following blank is Cyberterrorism
.
Explanation:
Cyberterrorism is the violent act by the use of an internet that results in the threat of any important files or the loss of life or the significance of the bodily harms, to achieve an ideological or political gains through the threat or the intimidation.
Answer:
b. the IP address can be spoofed, so if you want to read response from the deceived party, you can use IP spoofing to hide yourself.
Explanation: