Answer:
There are some fundamental activities that are common to all software processes:
•Software specification. In this activity the functionality of the software and constraints on its operation must be defined.
•Software design and implementation. ...
•Software validation. ...
•Software evolution
NSTISSI NO 4011 has become a widely accepted evaluation standard for training and education related to the security of information system. The standard is directed at information security professionals who are experts in identifying system vulnerabilities, investigating system security, documenting, analyzing and evaluating system security technology policies.<span />
When the network stack translates an IP address (network address) to a MAC address (data link address) it sends a broadcast using ARP to all devices on the subnet asking who has the specified IP address. The device with that IP address will then respond with it's MAC address to the ARP message's source.
With this in mind the answer to your question would either be broadcast or ARP request depending on what you have been learning in class.
They may invade privacy rights of air space and be used for other unintended acts such a bombings and espionage