Answer:
Boot Sector Virus
Explanation:
A malicious software or malware is an executable line of code, programmed by a cybercriminal for ill intentions. There are many types of malware namely; viruses, rootkit, keylogger, trojan horse etc.
A boot sector virus is a kind of malware that runs before the operating system, affecting the boot sector of the hard disk, so even when a linux live cd is running as the operating system, the virus is still active.
Answer:
Sam should send a digital document and request a signature. The could be fax or even an image printed out, if neither is possible get in contact with eh owner and his lawyer for more help.
Explanation:
Answer:
D. Expert systems
Explanation:
Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.
Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.
Generally, there are two (2) main characteristics of artificial intelligence (AI) systems and these include;
I. Non-algorithmic processing.
II. Symbolic processing.
In artificial intelligence (AI), the field of expert systems is the most important applied area because it models human knowledge.
Hence, expert systems represents knowledge as a set of rules.
Although, all expert systems are generally lacking in human capabilities and can only use inference procedures to proffer solutions to specific problems that would normally require human expertise or competence.
Some of the areas where expert systems can be applied are; monitoring, diagnosis, scheduling, classification, design, process control, planning, etc.
Answer:
The correct word for the blank space is: baseline standards.
Explanation:
Minimum Baseline Standards (MBS) refers to the minimum security guidelines companies set to protect their sensitive data. To achieve such objective, all the devices of an entity -<em>e.g.: servers, routers, and firewalls</em>- must be configured in a form that prevents external or internal attacks. Setting an MBS helps an organization to provide technical support faster since regular users will be working with a system that was implemented by the <em>Information Technology</em> (IT) department of the same association.