Answer: car | truck
Explanation: The pipe (|) symbol used can be used in regular expression to simply imply OR. This means when used in between expression, can be used to search for all matches of the strings in which it stands in between. In the scenario above, If the pipe symbol is located in between the two strings, such as [ cars | trucks], the expression returns possible occurrence of the strings cars and trucks. It may also be used to locate and return the occurrences of more than 2 strings, such as; string1 | string2 | string3
Answer:
The answer is "compromise"
Explanation:
In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.
- In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
- This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.
Answer is given below
Explanation:
differences between a file-processing system and a database management system is given below
file-processing system
- File system is a software that manages and organizes the files in a storage medium within a computer.
- It doesn’t provide backup and recovery of data if it is lost.
- There is less data consistency in file system.
- File systems provide less security in comparison to DBMS.
- It is less complex as compared to DBMS.
database management system
- DBMS is a software for managing the database
- It provides backup and recovery of data even if it is lost.
- DBMS has more security mechanisms as compared to file system
- It has more complexity in handling as compared to file system.
- There is more data consistency because of the process of normalization.
Answer: 3) Information extortion
Explanation:
Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.
- Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
- Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
- Thus, the correct option is option(3).