Answer:
A microprocessor is a computer processor where the data processing logic and control is included on a single integrated circuit. A computer need microprocessors to perform the functions of a computer's central processing unit.
Answer:
"Computer Based Information system (CBIS)" is the correct answer for the above question.
Explanation:
- CBIS means about that system that is used to produce the information or process the information and it is computer-based because CB stands for computer-based and IS stands for an information system.
- It means that a system that helps by the computer and it is used to process the information then it can be called CBIS.
- To process the information in a computer system there is a need for software, people, database, hardware and processor which is a set of CBIS.
- The above question also wants to ask about the system which is a set of software, people, database, hardware and processor then it is known as CBIS which is described above. Hence the answer is CBIS.
Answer:
the answer is computer, phone, laptop
Explanation: that is all ik
Answer:
a) range check
Explanation:
Validation can be defined as an automatic computer check that is designed to ensure any data entered is sensible, consistent, feasible and reasonable.
Basically, there are five (5) main validation methods and these includes;
I. Presence check: checks that the user enters (inputs) data into the field. It ensures a field isn't accidentally left blank.
II. Length check: checks that the data entered isn't too short or too long. It ensures that the data meets the minimum characters.
III. Type check: checks that the data entered is in the right format. For example, string, integer, float, etc.
IV. Check digit: checks that the digit entered is acceptable and consistent with the rest of the digits.
V. Range check: checks that the data entered is between the accepted lower (minimum) and upper (maximum) level.
Hence, range check is a validation type you would use to check that numbers fell within a certain range.
For example, 0 < x > 1000 is a range check.
Answer:
Sniffing.
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.
Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.
A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.
Basically, an unauthorized packet sniffer is used to steal user informations.
This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.
In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.