Answer:
Data Flow Diagram
Explanation:
Data flow diagram is representation of data which is processed in terms of input and output.It is a tool for designing the structure for a software.Rectangles,square and circles are used in representing the flow of information.
DFD consists two components
- Layers-It consist many layers,the top layer is called context diagram.
- Levels-The first level shows the main process of the system.
Answer:
It's c bodie I'm fr on this question rn lol
Answer:
D)
Explanation:
At first the two members just want to create the presentation but work together and agree to share the research and work together on creating the presentation.
The conflict resolution is more than agree upon problem, identify issue or brainstorm solutions. The answer is D) negotiate a solution.
Answer: Phishing
Explanation: A cybercrime in which, a target or targets are contacted by email, telephone or text message by someone acting or posing as a legitimate institution to lure these targets or a target into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords is referred to as Phishing.
The CyberCriminals use these information to access important accounts, steal identities and even money.
Beside email and website phishing, there are phishing methods like 'vishing' (voice phishing), 'smishing' (SMS Phishing).
SOME FEATURES OF PHISHING EMAILS
The Emails are usually Too Good To Be True with a sense of Urgency, telling you to click on the link fast because the offers are limited.
They may tell you that your account will be suspended unless you update your personal details immediately and with attachments you are supposed to click on and from an unusual sender.
Whether it looks like it's from someone you know or don't know if anything seems out of the ordinary, unexpected, out of character or just suspicious please don't click on it the link. It might just be phishing.