Answer:
The correct answer to the following question is Drive-by hacking
.
Explanation:
Drive-by hacking is the type of hacking which comes under the cyberterrorism.
Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.
Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.
Using the knowledge of pseudocodes it will be possible to write a code that calculates the amount of hours worked and giving warnings about it.
<h3>Writing a pseudocode we have that:</h3>
<em>while </em>
<em>if number == 0</em>
<em>break</em>
<em>hours =0 </em>
<em>for i =1 to 5 </em>
<em>hours = hours + time_out[ i ] - time_in[ i ]</em>
<em> If hours >36 : </em>
<em>print ( "Name is " ,name)</em>
<em>print( "No of hours are ",hours)</em>
<em>print("Congratulaion! Your working hours are more than 36")</em>
<em>If hours <30 : #</em>
<em>print ( "Name is " ,name)</em>
<em>print( "No of hours are ",hours)</em>
<em>print("Warning !!!")</em>
<em>End loop</em>
See more about pseudocode at brainly.com/question/13208346
#SPJ1
In the case above, To search through this database, they use SQL, a 4GL.
<h3>What is SQL?</h3>
SQL is known to be Structured Query Language (SQL) that is said to be a form of standardized programming language that is employed to manage relational databases and carry out various operations on the data in them.
Note that In the case above, To search through this database, they use SQL, a 4GL network that can help.
Learn more about SQL from
brainly.com/question/25694408
#SPJ1
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
Answer:
I can't read that pls reformat, or take picture.
Explanation: