Answer:
Types of cybercrime
Here are some specific examples of the different types of cybercrime:
*Email and internet fraud.
*Identity fraud (where personal information is stolen and used).
*Theft of financial or card payment data.
*Theft and sale of corporate data.
*Cyberextortion (demanding money to prevent a threatened attack).
*Ransomware attacks (a type of cyberextortion).
*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
*Cyberespionage (where hackers access government or company data).
Most cybercrime falls under two main categories:
*Criminal activity that targets
*Criminal activity that uses computers to commit other crimes.
Explanation:
Answer:
I know answer of 2 and 4
2. Central procesding unit
4. Personal computer
Answer:
1.In the first query the column Z of table xyz wil change and set to its default value so we use alter command .
Syntax :ALTER TABLE TABLENAME ALTER COLUMN NAME SET DEFAULT VALUE
So SQL query is :
ALTER TABLE XYZ ALTER Z SET DEFAULT 9999 ;
This query will Change the column Z of a table XYZ to acceptdefault value 9999 .
2.In the second query we delete a table from database so we use DROP command .
Syntax :DROP TABLE TABLENAME;
So SQL query is :DROP TABLE XYZ;
This query will delete the table from database.
3.In the last query we have to change the column Z from table again we use alter command .
Syntax:ALTER TABLE TABLENAME DROP COLUMN COLUMNNAME ;
So SQL query is :
ALTER TABLE XYZ DROP COLUMN Z;
This query will delete column Z from the table XYZ.