Is it asking for a web site like .edu? or something like that?
Answer:
C. Object Oriented
Explanation:
In Object Oriented approach to development of information systems, processes and data are handled independently and could be tested as separate modules before the actual development begin.
Hope this helps!
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
Answer:
D. Think-Feel-Do Model
Explanation:
The Think-Feel-Do Model or simply just TFD model is a marketing model used by marketers to engage their target customers.
THINK - Involves the marketers having an insights into the target customer's needs that are important.
FEEL - Understanding the target customers basic drive. It involves inbound and outbound marketing communications.
DO - This involves the creation of marketing materials to be used in targeting the target customers for the products/services.