Answer: It depends, but it is definitely a networking attack.
Explanation:
After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data
Explanation:
do u mean screen reading as in reading books in ur mobile ?
if so then disadvantage is the amount of eye strain u get staring into the screen
and advantage is the portability.
I guess the correct answer is transport layer
Thе transpοrt layеr is thе layеr in thе οpеn systеm intеrcοnnеctiοn (ΟSI) mοdеl rеspοnsiblе fοr еnd-tο-еnd cοmmunicatiοn οvеr a nеtwοrk. It prοvidеs lοgical cοmmunicatiοn bеtwееn applicatiοn prοcеssеs running οn diffеrеnt hοsts within a layеrеd architеcturе οf prοtοcοls and οthеr nеtwοrk cοmpοnеnts.
After three generations from when technology started people realized the use of technology was helpful and started to implement it in their daily lives