(a) To run a software => RAM
(b) To store a software => ROM
Answer:
Phishing
Explanation:
Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.
Phishing could be carried out via emails, telephones, or even text messages.
In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.
Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.
Answer:
d. Stockholder theory
Explanation:
The theory of maximising profits
It finds a AMOUNT or percentage of a number.
You find this by multiplying or dividing.
Answer:
The answer to this question can be described as follows:
a) True
b) False
c) False
d) False
e) False
f) True
Explanation:
In option a, PATA device is used to connect the hard drives into systems. Its title suggests, depends on parallel transmitting technology, contrasted to the compulsive-signaling tools.
In option b, SATA1 is a first-generation device, and SATA3 third generation, that's why it is wrong.
In option c and option d, both were wrong because RAID 0 and RAID 5 are Cloud computing software for storing data.
In option e, An internal SATA data cable with an eSATA port can not be used as an additional connection is provided by the eSATA port.
In option f, It is true because there are 7 pins in internal SATA.