Answer:
Explanation:
It knows how to remember data and where to find that data. In other words, it knows how the raw memory works. (RAM).
It understands how to make a program run within the confines of its logical steps in an order that makes the program work the way the user intends.
It can be made to display short cuts, or any icon or picture (not an obvious talent).
It can search for unwanted intruders like ads or viruses.
It can can time events even to the point of getting your coffee ready for you with the proper add on.
Answer:
C) chain
Explanation:
Small group network comprises of a vertical, direct, chain, all channel and box network
The vertical network is a network that is made for some specific purpose or goal of the business organization.
The direct network is a network that is directly interrelated to each other.
The chain network is that network in which the formal chain of command follows through which proper communication can be done in all the departments without any barriers to a communication network
It also shows that each member can communicate the person below and above their position only in a vertical hierarchy. It follows the top-down approach
This all channel network follows an informal communication network through which anyone can communicate with anyone at any time with following any chain of the business organization
The box network covers all the things in one network. Like - various software, packages, etc
In the given case Peter is asking permission from the supervisor and supervisor is discussing with the department director, is showing the formal chain of command that's why according to the given scenario the most appropriate answer is chain network.
Answer:
denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)
Explanation:
Denial-of-service attack -
It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .
The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .
In case of the distributed denial-of-service attack , the flooding is done by many different sources .
Hence , from the given scenario of the question ,
The correct answer is denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .