Answer:
Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts.
Answer:
Brute Force attack.
Explanation:
A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.
A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.
Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.
An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.
The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.
A compiler is often used when you want to test your code; that would often be your second step.
Answer:
Previous decisions were flawed
Explanation:
An algorithm depends entirely on the data input into the system in the decision making process.
As such, when there are conclusions in the data set used by the algorithm for decision making which are distorted, such as the association of less individuals that drink and drive in the rich cities than can be found in poorer communities due to the presence of less bars uptown and as such drivers from uptown areas are given preference may include a bias that is due to conclusion on which the previous decisions were made and used in the algorithm which may have been flawed or need more detailed analysis