Asldfjasjdkflajfasjdf;laksjdf;kljas
Answer:
Honeytoken
Explanation:
Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.
Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.
Answer:
True
Explanation:
A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.
Generally, a computer is composed of five (5) main components and these include;
I. Input unit.
II. Output unit.
III. Central processing unit (CPU).
IV. Storage (memory) unit.
V. Power supply unit (PSU).
A power supply also referred to as power supply unit (PSU) can be defined as a hardware component of a computer that converts and step-down the domestic alternating current (AC) electrical power to a low-voltage regulated direct current (DC) power, so that the internal components of a computer can be supplied with power.
Hence, the power supply unit (PSU) serves as a rectifier by converting alternating current (AC) house current to direct current (DC) and as a transformer to step-down voltage from 220 Volts or 110 Volts to 50, 30, or 20 Volts depending on the requirements of a computer.
Answer:
Redundancy
Req. 1 and Req. 3 are seemed to say the same thing. We need to remove the first sentence in Req. 1
Conflict and understandability
Req. 1 states that access is through web browser while Req. 4 states that access is via html. We have to re-write the Req. 3 to make it clear that users do not actually have to write directly html to communicate with the system.
Completeness
Req. 5 states that print out will “mainly” be documents. What else might be printed? What other inputs will be produced?
Either remove mainly or clarify other print out.
What version of html or web browser is assumed in Req. 1 and Req. 3?
Explanation:
Answer:
C) Session Layer.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Basically, each layer has its unique functionality which is responsible for the proper functioning of the communication services.
Session layer is the layer of an Open Systems Interconnection (OSI) model which describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.