Answer:
Msinfo32.exe, cmd
Explanation:
The msinfo.exe is a tool that gathers information concerning your computer system and displays a comprehensive view of your system components, hardware, and software environment, that can later be use to diagnose computer issues.
Command Prompt is an interpreter application for command line which is available in nearly all Windows operating systems. It is utilized for executing entered commands.
there are different ones like
Not Otherwise Specified
Network Operating System
Answer:
c. mentorship programs taking place via the internet
Explanation:
The World Wide Web (WWW) was created by Tim Berners-Lee in 1990, which eventually gave rise to the development of Web 2.0 in 1999.
Web 2.0 can be defined as a collection of internet software programs or applications which avails the end users the ability or opportunity to share files and resources, as well as enhance collaboration over the internet.
Basically, it's an evolution from a static worldwide web to a dynamic web that enhanced social media. Some of the examples of social media platforms (web 2.0) are You-Tube, Flickr, Go-ogle maps, Go-ogle docs, Face-book, Twit-ter, Insta-gram etc.
Some of the main characteristics of Web 2.0 are;
I. Social networking.
II. Blogging.
III. Interactive comments being available on many websites.
Also, most software applications developed for Web 2.0 avails its users the ability to synchronize with handheld or mobile devices such as smartphones.
However, mentorship programs taking place via the internet is not a characteristic of Web 2.0 but that of Web 3.0 (e-mentoring).
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.