Answer:
To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.
Explanation:
Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.
Answer:
the third one
Explanation:
the rest is below 28 apart from the third one which is 28 and is the most
Answer:
a) EDI Semantic Layer
Explanation:
EDI is an acronym for electronic data interchange and it can be defined as a form of communication between interconnected computer systems and software applications with respect to business informations in standard digital formats.
This ultimately implies that, electronic data interchange (EDI) involves the transfer of business informations such as financial transactions between the computer systems of various organizations such as banks, companies, governmental agencies, etc. Thus, it avails businesses the ability to create strategic communications using computer to computer links to effectively and efficiently exchange business informations electronically or in digital formats.
Hence, the EDI Semantic layer describes the business application that is driving electronic data interchange (EDI).
If you have an iPhone, you can use iMovie