Answer:
The major characteristics of computers are the following:
Speed : A powerful computer is capable of executing about 3 million calculations per second.
Accuracy : A computer's accuracy is consistently high; if there are errors, they are due to errors in instructions given by the programmer.
Reliability : The output generated by the computer is very reliable as long as the data is reliable.
Memory/Storage Capacity : The computer can store large volumes of data and makes the retrieval of data an easy task.
Versatility: The computer can accomplish many different things. It can accept information through various input-output devices, perform arithmetic and logic operations, generate a variety of outputs in a variety of forms, etc.
Automation: Once the instructions are fed into computer it works automatically without any human intervention.
Diligence: A computer will never fail to perform its task due to distraction or laziness.
Convenience: Computers are usually easy to access, and allow people to find information easily that without a computer would be very difficult.
Flexibility: Computers can be used for entertainment, for business, by people who hold different ideals or who have varied goals. Almost anyone can use a computer, and computers can be used to assist with almost any goal.
<em>I hope it helps you!!!!</em>
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
Answer:
Ronald missed the words: One-time password, Secure
Explanation:
Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.
Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.
Answer:
what causes gravity to have a amount of force on one object but not another
Explanation:
The supernatural condition whereby a human transforms into a wolf is called a werewolf.