Answer:
b. white-hat hacker
Explanation:
A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.
These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information
<span>Zenmap's topology tab displays a "Bubble Chart" that shows the relative size and connection type of all discovered IP hosts.
</span>A kind of chart which
shows three dimensional data is known as Bubble chart. It also can be seen as
the variation of scatter plot where bubbles replace the data points.
Answer:
View Base tables: Virtual table based on a SELECT query
CREATE VIEW statement: Data definition command that stores the query specification in the data dictionary
DROP VIEW statement: Data definition command that removes the query specification in the data dictionary
Explanation:
Views are virtual tables, which can be created by select queries using the real database tables.
Creating and dropping views can be done by the CREATE VIEW and DROP VIEW statements.
<u>CREATE VIEW syntax:</u>
CREATE VIEW view_name AS
SELECT column1, column2, ...
FROM table_name
WHERE condition;
<u>DROP VIEW syntax:</u>
DROP VIEW view_name;