Answer:
Control Objectives for Information and related Technology (COBIT)
Explanation:
COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.
Answer:
The type of attack is <em>Phising Email.</em>
<em />
Explanation:
Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.
Note: The matrix referred to in the question is: ![M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]](https://tex.z-dn.net/?f=M%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%2F2%261%2F3%260%5C%5C1%2F2%261%2F3%260%5C%5C0%261%2F3%261%5Cend%7Barray%7D%5Cright%5D)
Answer:
a) [5/18, 5/18, 4/9]'
Explanation:
The adjacency matrix is ![M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]](https://tex.z-dn.net/?f=M%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%2F2%261%2F3%260%5C%5C1%2F2%261%2F3%260%5C%5C0%261%2F3%261%5Cend%7Barray%7D%5Cright%5D)
To start the power iteration, let us start with an initial non zero approximation,
![X_o = \left[\begin{array}{ccc}1\\1\\1\end{array}\right]](https://tex.z-dn.net/?f=X_o%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%5C%5C1%5C%5C1%5Cend%7Barray%7D%5Cright%5D)
To get the rank vector for the first Iteration:

![X_1 = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]\left[\begin{array}{ccc}1\\1\\1\end{array}\right] \\\\X_1 = \left[\begin{array}{ccc}5/6\\5/6\\4/3\end{array}\right]\\](https://tex.z-dn.net/?f=X_1%20%3D%20%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%2F2%261%2F3%260%5C%5C1%2F2%261%2F3%260%5C%5C0%261%2F3%261%5Cend%7Barray%7D%5Cright%5D%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D1%5C%5C1%5C%5C1%5Cend%7Barray%7D%5Cright%5D%20%5C%5C%5C%5CX_1%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D5%2F6%5C%5C5%2F6%5C%5C4%2F3%5Cend%7Barray%7D%5Cright%5D%5C%5C)
Multiplying the above matrix by 1/3
![X_1 = \left[\begin{array}{ccc}5/18\\5/18\\4/9\end{array}\right]](https://tex.z-dn.net/?f=X_1%20%3D%20%5Cleft%5B%5Cbegin%7Barray%7D%7Bccc%7D5%2F18%5C%5C5%2F18%5C%5C4%2F9%5Cend%7Barray%7D%5Cright%5D)
Answer: Joystick is the only one that makes sense, a stylus and digitizer are both used on drawing tablets, not computer games.