Answer:
Impersonation
Explanation:
Impersonation - it is one form of social engineering that focuses is to gain access of the network in order to take advantage of the network for committing fraud or finding any theft. it is different from another form of engineering because it doesn't include phone or mail instead it depends on personal communication.
some form of social engineering is phishing, tailgating, pretexting, etc.
Answer:Well in my opninon i would be angry and mad cause i am being separated from my faamily and friends but sooner i would feel good cause u get use to it fast>.<
Answer:
<em>I</em><em> </em><em> </em><em> </em><em> </em><em>think</em><em> </em><em> </em><em> </em><em>that</em><em> </em><em> </em><em> </em><em>the</em><em> </em><em> </em><em> </em><em> </em><em>answer</em><em> </em><em> </em><em> </em><em>is</em><em> </em><em> </em><em> </em><em> </em><em>true</em><em>.</em>
Answer:
Liquidated damages
Explanation:
Liquidated damages
Liquidated damages are the damage amount which need to pay by one party if there is any breach of contract between the parties. it is decided prior at the time of making a contract and needs to be paid if there is any damage to the signed contract.
breach o contract can be taken on the basis of completion of the project in the given time. if the project not done on a given time then liquidated damage needs to be paid to another party.