Answer:
Public Relations or Pull Request (computer programming)
Explanation:
Hope this helps
Answer:
The answer is Letter D. Dumpster diving.
Explanation:
This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.
It is important to inform that the dumpster diving it is not limited to searching through the trash for obvious treasures like acess codes or passwords written down on sticky notes.
The acronym RFID (Radio Frequency Identification) describes
networked devices that contain microcomputers but are not thought of as
computing devices, such as refrigerators, automobile components, light
bulbs, and industrial control devices. RFIDs are battery-powered sensors that gather and transmit data to a reading device. Some sensor based technologies are scanning electron microscopes, LiDAR,radar, GPS, x-ray, sonar, infrared and seismic.