Answer:
As in the real world, people using a program would provide different inputs, that would require different outputs. For example in a traffic light system, there could be a function that constantly checks for if the button is pressed. When the button is pressed the traffic light loop would branch out of its current running code in order to turn the lights to red, and allow the pedestrians to cross.
Answer:
First one is B size because if it's too small or big it might get pixelated or fuzzy, and for the second parr it would be B printable .
Explanation:
Answer:
While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys
Answer:
Option (A) is the right answer.
Explanation:
The following terms can be described as :
Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.
Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.
Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.
Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.
According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.