Cyber stalking is when someone stalks them on social media sites like facebook. They try to contact you or will even try to find you.
Answer:
Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.
Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.
Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system
Some of the online activities among businesses are:
- SEO consultant. ...
- Web designer or web developer. ...
- Blogger. ...
- Virtual assistant. ...
- Affiliate marketer, etc
<h3>What are Online Activities?</h3>
This refers to the various activities that are done on the world wide web and is usually used by businesses to increase visibility, and in turn, revenue.
Hence, we can see that the use of online activities by businesses are important because the products and services for sale by businesses are advertised to target audiences through some of the aforementioned activities.
Read more about online activities among businesses here:
brainly.com/question/27172895
#SPJ1
Answer:
Option d) B is 1.33 times faster than A
Given:
Clock time,
No. of cycles per instructions,
Solution:
Let I be the no. of instructions for the program.
CPU clock cycle, = 2.0 I
CPU clock cycle, = 1.0 I
Now,
CPU time for each can be calculated as:
CPU time, T =
Thus B is faster than A
Now,
Performance of B is 1.33 times that of A
<span>A linear bus topology uses a common background cable to connect all network devices.</span>