Answer:
1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks
2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.
3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.
4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.
5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.
6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.
Answer:
C. Spoofing.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.
Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.
Answer:
#include <stdio.h>
int main()
{
int userNum1;
int userNum2;
userNum1 = -1;
userNum2 = 7;
if (userNum1 < 0)
printf("userNum1 is negative. \n");
if(userNum2 > 9)
userNum2 = 0;
else
printf("userNum2 is less than or equal to 9.\n");
return 0;
}
Explanation:
Initialize userNum1 and userNum2.
If userNum1 is less than 0, print 'userNum1 is negative" and end with newline.
if userNum2 is greater than 9, assign 0 to userNum2.
Otherwise, print "userNum2 is less than or equal to 9 and end with newline.
does it say its deleted if so make a new account and the apps and website put in your email and passwords if not then put in your pass ord and email to get it back what device u have.
The three different types of hard drives are:
<h3>What is the SATA drive?</h3>
This was said to be Introduced in the year 2003, SATA (or Serial Advanced Technology Attachment) is known to be a kind of a default interface that was made for a lot of desktop and laptop hard drives.
Hence, The three different types of hard drives are:
Learn more about hard drives from
brainly.com/question/1558359
#SPJ1