Answer:
Viruses can enter your computer in any number of ways, such as via an email attachment, during file downloads from the Internet or even upon a visit to a contaminated Web site.Jun 2, 2010
Explanation:
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
Pie graph but idk if thats the answer
Answer: (D) It makes smaller collision domain and (F) It increases the number of collision domains.
Explanation:
The result of segmenting a given network with the bridge is that it basically break the domain of the collision that increases the domain number. In additionally, it also makes it more smaller.
Switch basically expands the quantity of collision network domain in the system. Switches are designed with V-LANs will diminish the given size of domain of the collision by increasing the number of the collision domain in the network.
DSL ranges from 128Kbps to 3Mbps, so this would be your bottleneck.
Answer:
Brute force
Explanation:
The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.
In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.