Answer:
because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects
Explanation:
so l know this much it is correct please mark me brainllest
Excel Macros, or .xlsm, stores automated steps for repetitive tasks.
Answer:
c. An active attack
d. A passive attack
Explanation:
Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.
Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.
Explanation:
user interface, also sometimes called a human-computer interface, comprises both hardware and software components. It handles the interaction between the user and the system.
There are different ways of interacting with computer systems which have evolved over the years. There are five main types of user interface:
command line (cli)
graphical user interface (GUI)
menu driven (mdi)
form based (fbi)
natural language (nli)
Answer: Botnet
Explanation:
Botnet is the process when a hacker user uses multiple guest computer to crack a password. Basically, hackers use botnet for performing the distributed denial of services attack in the network.
It also steal the data and allowed attacker to approach its connection and access its device.
Botnet word is the combination of robot and network and botnet can be controlled by using the command and control software.