Answer: (D) Distributed denial- of- service (DDoS)
Explanation:
The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.
- Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
- This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.
Therefore, Option (D) is correct.
Information technology is the application of computers to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.
Answer:
enables you to make changes to one part of an image without accidentally changing other parts
Explanation:
Computer aided designs incorporate the use of multiple layers in drawings. The first layer is known as the layer 0, while the present layer the designer is working on is known as the current layer. The advantage of the incorporation of layers in designs include the following
1. It helps objects to be altered, grouped, hidden and moved as the designer wishes.
2. Layers can be grouped and worked on separated and common properties like color and line weight assigned to them.
3. Layers can be manipulated as the user wishes. They can be locked, frozen, turned off, etc. Locking prevents accidental changes being made on objects.
Answer: Discretionary access control (DAC)
Explanation: Discretionary access control is the control system that is imposed over the information system. The information systems contains different objects and subjects that gets the permission to do the operations.
The operation which the components can do are sharing the data to other object or subjects, privilege providence, change in the rules for the access, security entities getting changed etc.