<span>To the computer f, this answer is because when reading the statement I assume that there is no type of connection and / or communication between the computer a and c; therefore to be profitable the computer c should return the package sending it back to computer f.</span>
Hey there,
I believe that your correct answer would be that "<span> some people will tell you what they think you want to hear </span>". When you ask someone about the perceptions of your person trait, they will most likely <span>tell you what they think you want to hear because its what they want to make you happy.
For example: Jimmy ask billy "Am I fat Billy"
Billy tells Jimmy "No, Your not fat, you look just great".
But really, Jimmy is very fat.
The point is that people are going to say things that make you feel happy and something that you want to hear.
~Jurgen</span>
Answer:
D
Explanation:
Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.
Answer:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
Explanation:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:
- It defines what is required from organization’s employees for the security of the IT systems
- Information security policies provide a means to secure the organization against external and internal threats
- Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
- Information security policies are created to hold each employee responsible with regard to information security