Answer:
A. Spoofing
Explanation:
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.
Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take
Answer:
Margin of Error=M.E= ± 0.0113
Explanation:
Margin of Error= M.E= ?
Probability that watched network news programs = p = 0.4
α= 95%
Margin of Error =M.E= zₐ/₂√p(1-p)/n
Margin of Error=M.E= ±1.96 √0.4(1-0.4)/7200
Margin of Error=M. E = ±1.96√0.24/7200
Margin of Error=M. E- ±1.96* 0.005773
Margin of Error=M.E= ±0.0113
The Margin of Error is the estimate of how much error is possible as a result of random sampling.
Answer:
cluster
Explanation:
A cluster in a computer system is a collection of servers and other resources that work together to provide high reliability and, in certain situations, load balancing and parallel processing.
This is hyped as the Internet of Things (IoT). Sometimes also called IoE, the Internet of Everything.