Answer:Weak session ID generation algorithm
Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.
It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.
Answer
economies of scale
Explanation
Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. Benefits of moving everyday business to the cloud is that it can provide small businesses with significant savings. In cloud computing Virtualization increases the value of physical server hardware, meaning businesses can do more with less.Business that subscribes to a specific computing model has its entire system fully functional within a short time will have economies of scale benefit. This is because this will be consuming information technology that can lead to significant cost saving.