Answer:
True is the correct answer for the above question.
Explanation:
- To secure the data is the first rule for any organization because when the data is lost or unsecured the whole system can have the problem.
- If any person wants to hack the system or any organization then they first choose to hack the data of the system.
- So there is a Hundred of law in the US taken by the US government at the Federal trade commission act to secure the data of the organization.
- The above question also states the same which is defined above. Hence It is a true statement.
Answer:
Advanced persistent threat.
Explanation:
Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.
It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.
Answer:
The nature of computers and code, what they can and cannot do.
How computer hardware works: chips, cpu, memory, disk.
Necessary jargon: bits, bytes, megabytes, gigabytes.
How software works: what is a program, what is "running"
How digital images work.
Computer code: loops and logic.
Big ideas: abstraction, logic, bugs.
My opinion is the answers A and D. I would choose A if you can only choose one, though.