Answer:
Internet Protocol and Transmission Control Protocol
Explanation:
Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other. They are developed by Bob Kahn and Vint Cerf.
Javascript can be executed i believe. but i just googled it,check it for yourself
Be consistent in whether you use single or double quotes to declare your strings: our autograder assumes you'll be consistent.
Answer:
metasploit.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.
Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.
Answer:
The answer is Magnetic
Explanation:
Magnetic medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.
Magnetic based drives, for example:- Hard disk. Floppy Disk. Magnetic tape.
Optical based drives, for example:- CD drive (ROM and RW) DVD drive (RPM and RW)
Flash or solid state chip based drives, for example:- USB drive. SD cards.