A . Pop
D . K-popp I guess
The technology that would be useful to look into the activities of the team member is the computer forensics
<h3>How to determine the technology?</h3>
Usually, when there is a case of data breach; the technology used to tackle the problem is the use of computer forensics.
This is so because computer forensics involves identifying the storage of data on a computer system
Hence, the manager should make use of computer forensics
Read more about computer technology at:
brainly.com/question/1538272
#SPJ4
Answer: b
The computer virus is simply a ___
b. Set of computer instructions or code
Answer:
b. they are located at the intersections of the network of wires and cables that make up the internet.
Explanation:
Given that Router is a computer networking device that operates by transferring data packets between computer networks, while also ensuring traffic organizing tasks on the Internet.
Hence, Routers put packets in the right order after they arrive at their destination by matching the destination IP address of the packet and one of the addresses in the routing table.
Also, Routers check the address on each packet that arrives and decide which way it should go next by ensuring the data packets are summarized for the outgoing interface recorded in the table entry.
Therefore, the correct answer is option B
Answer:
pros: a lot of info
cons: a lot of it can be fake!
Explanation: