spec sheet is a document that summarizes the performance and other technical characteristics of a product, machine or component.
Answer:
The answer to this question is given below is in the explanation section.
Explanation:
manages the function of all the hardware and other software used in the computer:
operating system is defined as a system software that manages computer hardware and software resources and provide common services for computers programs.All application software computer programs requires an operation system to function. operating system controls computer hardware run the computer programs and organize file.
CPU:
central processing unit that bring the instruction from memory to be executed and decodes.
Storing device:
Any hardware that can hold information temporarily and permanently. we distinguish two type of storage: as primary storage device and a secondary storage device.
Example:
- Magnetic storage device:hard drive,floppy diskette etc.
- optical: Blu-ray disc,CD Rom disc.
Flash memory device:memory card memory sick,ssd
Hardware:
Hardware include the physical features,which are every part that you can either see or touch, for example monitor,case,keyboard,mouse and printer.
Software:
The part which activate the physical components called software. it includes the features that resposible for directing the work to the hardware.
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
read the slides ; Table Properties are the way the table appears or looks.
Probably an Operating System like Mac, Linux, or Windows. There may be a type of downloadable software to do this, but may be debatably safe.