*camry ? and I'm not sure but I will be able to help after u clarify this question for me
C and d is the right answer
<em>Intrusion means unauthorized and harmful activities happening in your system. Any irregularities in the system is considered as intrusion and therefore monitored by administrators and can be detected using Intrusion Detection System.
</em>
<em>Examples of Intrusion attacks in a network are:
</em>
- <em>Denial of Service (Dos) - denial of service means flooding the system causing it to crash and unable to respond to a service request. Normally, a DoS attack is facilitated by numbers of hosts sending enormous request to a victim computer. The requests can be in a form of code that would flood the system and making it to unresponsive. </em>
- <em>Man in the Middle Attack (MiM) - a hacker would be in the middle of the communication between a client computer and a server computer. The hacker can mimic IPs within the network and steal information then sends it to the intended receiver. </em>
- <em>SQL Injection - For websites that runs database like SQL, a code by the hacker can be added to the website and making him gained access to the database information successfully.</em>
A computer that passes the Turing test might show that has the ability to exhibit intelligence similar to, or indistinguishable from that of a human.
<u>Answer:</u>
<em>Pie chart</em>
<u>Explanation</u>:
Among all the other charts, <em>Pie chart is commonly used to find the largely used, and scarcely used items in a quick phase. </em>
This stands best do survey. Here is also a situation given in the question as like, the teacher has given the <em>list of social media and the children are polling on to it. </em>
<em>So a line chart would definitely show good representation but it wouldn’t be an effectual visual appearance for survey kind of approach.</em>