Answer:
Damage and chaos. ...
An ego stroke. ...
Monetary or information gain. ...
Stealth. ...
Prevention.
To take control of a computer and use it for specific tasks.
To generate money.
To steal sensitive information (credit card numbers, passwords, personal details, data etc.)
To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
To cripple a computer or network.
Explanation:
Answer:a) Mainframes, miniframes, PCs, desktop Internet computing, mobile computing
Explanation: The hierarchy of the computers or computing are in the generation is:-
- Mainframe:-designed for the execution of huge data processing , storage and execution.
- Miniframe:-has similar functioning as the mainframe but on smaller scale and version.
- Personal computer(PC):-It is designed for the individual purpose and according the need of the user.
- Mobile computing:-computing that can be done on the mobile phone similar to the computing on the personal computer
- Internet computing:-the computing of the mobile and computer system with the facility of the internet connectivity.
Outlook is used for mainly emails. It also keeps track of your calendar, has contact and tasks.
Security filter app that filters the accessibility of things it deems inappropriate