she should leave and go somewhere else for a mminute to cool and then come backa nd close tabs.
Answer
Explanation:
Hacking is simply gaining access into a computer through weaknesses that were found in the network system.
We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.
These stages includes
1. Reconnaissance
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering tracks.
Soft and hard copies in my opinion
Voltage tester, Circuit finder, Screwdrivers and nut drivers specific to electricians, Pliers, measuring tape