Social media is so powerful in this generation because it is able to reach many different corners of the world. It is not only used merely for communication but also sometimes or most of the times for business. For Lindsay, the use of social media will allow her to increase the size of the customer base. The answer is letter A.
Answer:
Port scanner
Explanation:
The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.
Bot. A program that performs a repetitive task on a network. Cybercriminals install malicous bots on unprotected computers to create a botnet. Zombie army. (also calledBotnet) groups of bots
If a team player knows how to follow the rules, ambiguities can be prevented. Each member would be guided by specific details of their tasks and procedures. There is a clear definition of work premises that can avoid overlapping of work. This can give better productive results.
Answer: 3) Business development manager
Explanation:
JAD stand for joint application development and it is the methodology which basically involved users and client in the development and designing of the application.
It is the process which basically accelerate the designing of the information technology system. JAD involve managers , system analyst and users to develop the dynamic solution. But it does not involve the business development manager as the JAD basically focused o the individual approach in the development.