Answer:
vulnerability, risk
Explanation:
A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
The answer is C. Tablet, because that is the quickest, easiest, and most recent way of communication.
Answer:
client
Explanation:
The client makes a request for a service, and a server performs that service.
HTML5
HTML5 has fewer plug-ins like the ability to standardize how audio and video are presented on a Web page. It introduces the <video> element designed to remove the need to install 3rd party add-ons and plug-ins like adobe flash player. It also adds the <audio> element too that allows pages to smoothly add audio files.
Answer:
<u>First test:</u> Give a list of disordered numbers to the sorting algorithm an examine if the output is correctly sorted.
<u>Second test:</u> Give a list of ordered numbers to the sorting algorithm an analyze if the output is still correctly ordered.
<u>Third test:</u> Give a list of ordered numbers and some non-numeric values to the sorting algorithm and check how is managed the exception in case of error or if the output is correctly ordered.