Virus that infects files. Macro Virus is a virus that attaches itself to an executable application. This type of virus is commonly found in Microsoft Word or Excel programs.... Browser Hijacker.... Web Scripting Virus.
Good morning, I hope this helps, and if you don't mind, please mark me as brainliest ❤
Answer:
The capability to program for a longtime and not burn out and to know a few coding languages as well as have the ability to learn new languages quickly.
The data link layer software would replace the MAC address of the next hop or gateway when the destination address of a network packet is to a remote network.
<h3>What is a
data link layer?</h3>
The data link layer is the second layer of the OSI model and it can be defined as an interface between the network and physical layer. Also, it comprises two (2) main sublayers and these include the following:
- Logical link control (LLC) layer.
- Media access control (MAC) layer.
In Computer networking, the data link layer software would replace the MAC address of the next hop or gateway when the destination address of a network packet is to a remote network.
Read more on data link layer here: brainly.com/question/13131540
#SPJ1
The simple interset program is a sequential program, and does not require loops and conditions
The simple interset program in Python, where comments are used to explain each line is as follows:
#This gets input for the principal amount
P = int(input("P = "))
#This gets input for the rate
R = int(input("R = "))
#This gets input for the number of years
N = int(input("N = "))
#This calculates the simple interest
I = P * R * T * 0.01
#This prints the simple interest
print("Simple Interest =",I)
Read more about simple interest at:
brainly.com/question/2294792
Answer:
Correct Answer is (d) Information sensitivity policy
Explanation:
Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.
However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.
However, only information sensitivity policy is used for classifying and securing organization information to the outside world.
The intention of information sensitivity policy:
The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.