The programming model that is distinct from the others discussed because it focuses on the data, or object, rather than the logic, or function is object-oriented programming.
Answer:
- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.
Explanation:
Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.
Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.
Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.
Answer: D. - design, prototype, evaluate
Explanation: Took a Edmentum/Plato Quiz
<h2>It uniquely depends on the project requirement.</h2>
Explanation:
There are some reason, why a company needs part-time employees.
1. If it is a "tutorial institute or Computer training institute, it needs part-time employee, based on the type of learners". Eg. College student, school student, etc.
2. The "work might be minimum" and the company would have started newly. So, they need only few full time employees and others might work in part-time.
3. Few companies may incorporate freelancers too if the amount of work that the company will receive fluctuates on a daily basis.
So based on the budget of the project, the number of resources required, the amount of work, etc, we can decide about the number of part-time users and we can design job description accordingly.