Answer:
prepare (e.g. SQL prepared statements)
parse/convert (e.g. parse a string as an int/convert an array to string)
Explanation:
Answer:
B and C
Explanation:
xPos and yPos determine the center of the circle, and rad determines the radius of the circle drawn.
It cannot be A because it starts drawing a circle with the center of (4, 1). None of the circles ahve a center at (4, 1). It is B because while it does start at (4, 1), the repeat function adds one to the y and radius. While ti repeats 3 times it ends up drawing all 3 circles. C also works because it starts by drawing the biggest circle and then subtracting the values to make the other two. It cannot be D because in the repeat function it subtracts from the y value and radius too early, it doesn't draw the biggest circle.
Answer:
He should disable UPnP technology to disallow devices to dynamically add themselves to the network without configuration.
Explanation:
- UPnP stands for Universal Plug n Play.
- It is an easiest way that allows gadgets to find all other devices connecting to your network.
- This can also modify router settings to allow devices from outside the network to access the router.
- External IP address can also be obtained by the gadget and a new port forwarding map can be set
- So from all perspectives, UPnP is an open invitation for hackers to scan for the ports and hack into the device.
- UPnP is a vulnerability to the secure system
Answer:
Sara: Personal data
Jorge : Personal data + official data.
Wanda: Personal data + students data
Carl: Personal data + official data
Explanation:
Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.
Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.
Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.
Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.