Answer:
general & personal used for computing.
Answer:
Explanation:
The internet could be regarded has a marketplace or platform which gives individuals, businesses the opportunity to interact, relate, access opportunities, learn in an easy manner with the help of a data connection. The internet has redefined the process and concept of acesing information and interaction with the ease and coverage it brings. The Social media is could be seen a part of the internet platform which allows people to relate and interact, make friends, promote brands and so on. The internet and social media platforms however, in spite of its huge benefits comes with its inherent risk. Including the surge in cyber crime, immorality and information theft to mention a few. Common scenarios whereby banking details are being stolen from databases resulting in wholesale illegal transfer of funds. Issues of blackmail and violent defamation by groups of cohorts has also been a con in the advent of internet and social media, including growing trends of fake news which usually escalate tension, in which the recent unrest in my vicinity benefitted negatively from.
Answer:
Customer Table
- Customer name
- Customer id
Product Table
- Product id/number (primary key, auto increment)
- Product name
- Product sale price
Transactions Table
- Transaction Id
- Customer Id
- Product id
- Quantity
- Price
- Date
Explanation:
Natalie wants to fetch following information from database
- Look up customer name and sale price
- Sort items in db by product number
To lookup customer name and sale price perform a join on Transactions table and Customer table.Assuming database is build in mysql the query to fetch required results would be
select transction.productId,transaction.customerid,customer.customername from transactions join customer ON
customer.customerid=transcation.customerid
where productid="user provided product id of returned product"
For sorting products by number set produc number in product table a auto increment primary key
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
Dictary = {
'code':6734,
'dept': 'sales',
123-45-6789:"Mr.Potato Head \n234 Potato Lane \nPotato Chip, ID 77725"
}
for i in Dictary.keys():
if i == 123-45-6789:
print(Dictary.get(i))
break
else:
print("Key not found")
You can further test this code by deleting Mr.Potato head's info from the dictionary. I hope this helps!