Answer:
1. categories
2. character
3. code
4. portrait
5. conversation
6. stage
7. Landscape
8. backdrop
Explanation:
I'm not sure what "a visual programming language for children" would be, sorry about that, and sorry if these are wrong .-
Answer:
True
Explanation:
IPv6 Is a later version of IP addresses, used to solve the problem of the limited number of IPv4 addresses in the network.
Just like IPv4, IPv6 can also is configured to a device statically and dynamically. Dynamic IPv6 configuration could be a stateless autoconfiguration SLAAC, a stateless DHCPV6 or a stateful DHCPV6.
The IPv6 address is configured with a prefix and a prefix length and a EUI generated 64 bit interface or a random interface id by the device.
Answer: Authorization process
Explanation
Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.
Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.
Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".