Answer:
SYN spoofing attacks.
Explanation:
The Spoofing attack is used to access the personal information it is distributed the viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.
The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack is distributed across the Internet also it is detectable
Answer:A
Explanation:
Copy right is an intellectual property right granted by the government that gives the owner exclusive rights to use, with some limited exception, original expressive work.
Answer:
<u>Sock puppet</u>
Explanation:
A sock puppet, a reference to a puppet created by placing a sock over one's hand, is a misleading or fake online identity created to promote a particular point of view, often in praise of a firm, organization, product, or individual; to manipulate public opinion or to argue, bully or review products. Regardless of the purpose it was created for, sock puppets are rarely welcome in online communities and forums.
Answer:
D) a multivalued attribute
Explanation:
A multivalued attribute can have more than one value associated with the entity key.