Answer:
Software requirement specification
Explanation:
requirement specification is the first step before proceeding with any project.
we should validate our output at all phases with software requirement specification
Answer:
Taskbar or they are pinned to desktop
Explanation:
Answer:
No, battery is based on your phone activity. Simply turning your phone on will not take away battery percentage.
Answer: It depends, but it is definitely a networking attack.
Explanation:
After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data