Answer:
Register-it contains all the instructions that are present in the processor.
Memory location- it is the particular memory address where the data is stored.
Explanation: Difference between register and memory location are as follows :-
- Register are the found in the CPU internal storage and memory location is present on the RAM.
- Registers are faster in movement as compared to the memory location.
- Register has the capacity of holding of less data as compared to the memory location which can store data in large amount .
Answer:
C. Use DHCP to automatically assign addresses
Explanation:
DHCP (Dynamic Host Configuration Protocol) is a network protocol used on IP networks where a DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.
In addition to the IP address, DHCP also assigns the subnet mask, default gateway address, domain name server (DNS) address and other pertinent configuration parameters.
The primary reason DHCP is needed is to simplify the management of IP addresses on networks. No two hosts can have the same IP address, and configuring them manually will likely lead to errors. Even on small networks manually assigning IP addresses can be confusing, particularly with mobile devices that require IP addresses on a non-permanent basis. Also, most users aren’t technically proficient enough to locate the IP address information on a computer and assign it. Automating this process makes life easier for users and the network administrator.
Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.
Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".
Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.
Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.
D) Web content developer
Explanation:
A content developer writes a well-researched content for websites, publications, and television. They also write sales copy and other marketing material for online and offline marketing. They develop text, graphics, audios, and videos.
Skills that help web content developer:
- Reading news every day
- Write regularly
- Study end audience
- Develop original and unique content
- Research; reading other people's content as well
- Provide solutions through your content
Besides these, a web content writer must possess technical skills like front-end web development. They must know basic HTML formatting and search engine optimization.