Answer:
A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.
Explanation:
In your question you asked architure but maybe it is architecture (•;
Answer:
//Code is created using java
import java.util.*;
// returns the sum
public int sum(int N)
{
if(N==1)
return (1);
else
return N+sum(N-1);
}
// code to return the Bipower ouput
public int BiPower(int N)
{
if(N==1)
return (2);
else
return 2*BiPower(N-1);
}
// Code to return TimesFive output
public int TimesFive(int N)
{
if(N==1)
return 5;
else
return 5 + timesFive(N-1);
}
public static void main(String args[])
{
//Prompts the user to enter a nonnegative integer
int N = Integer.parseInt.(console.readLine("Enter a nonnegative integer: "));
//Outputs the sum, Bipower and TimesFive
System.out.println(sum(n));
System.out.println(BiPower(n));
System.out.println(TimesFive(n));
}
}
Answer:
Sniffing.
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.
Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.
A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.
Basically, an unauthorized packet sniffer is used to steal user informations.
This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.
In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.
Answer:
a load tester.
Explanation:
Based on the information provided within the question it can be said that in this situation the tool that you should use is known as a load tester. This tool allows you to test your servers in order to see how it behaves under both normal conditions as well as the anticipated peak load conditions that it may be encountering in the near future. Which is exactly what you need for your website.