Answer:
See explaination
Explanation:
We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.
The listed and explained below are some of the threats;
a) Compromised browser:-
Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.
Phishing:-
Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .
Poisoned websites:-
These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.
Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .
These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.
Answer:
You can answer this very easily by considering which of the circumstances affect the end user and which affect the developer:
1) Didn't use comments in the code
- affects developers
2) User complaints about language used in the program
- affects users
3) The variables have meaningless names
- affects developers
4) The program should have used a loop
- affects developers
5) The numeric results are incorrect
- affects users
Your answers then are 2 and 5, spoken languages and incorrect output will very much affect the user experience.
Answer:
To create a new database, follow these steps:
1.In the Mail Merge task pane, click Next: Select Recipients.
2.Click Type a new list.
3.Click Create. ...
4.After you type the information for a record, click New Entry to move to the next record. ...
5.In the New Address List dialog box, click OK
Answer:
Answer to the following question is anthropomorphism.
Explanation:
Anthropomorphism is considered as the error in the following context of the scientific reductionism. Anthropomorphize is the source of an error that needs to reconsider.
Anthropomorphism is an attribute of the human qualities, emotions, thoughts, motivation, intentions, and characteristics to the non-living beings or the nonhuman beings, things or objects.