Answer:
Option (A) is the correct answer.
Explanation:
A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.
In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--
- Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
- Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
- Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
Answer:
following are the OSI Layers
1.physical layer
2.datalink layer
3.network layer
4.transport layer
5.session layer
6.presentation layer
7.application layer
Explanation:
physical layer is used to transmit media,signal and binary information
datalink layer is used for physical addressing MAC and LLC
network layer is used for path determination and ip
transport layer is for end to end communication and reliability
session layer is for interhost communication
presentation layer is for data representation and encryption
application layer is network process to application
The answer is;
Current
Voltage
Power/Wattage
Circuit
Water moving through pipes is like electricity flowing in a circuit. The flow of electricity is an actual flow of electrons. That movement of electrons is what is known as current. Think of current as the volume of water flowing through a water pipe. The electrons need some force or pressure to move, and so is water in a pipe. The voltage is that electromotive force; the pressure that pushes the electrons in a system. The power measured in Watts is the rate at which the energy is consumed. For the current to flow the circuit must be complete. Otherwise we cannot say that we have power if the circuit is not closed.
Hello <span>Huber5598 </span>
Question: <span>You need to prevent the use of tftp through your firewall. which port would you block?
</span><span>
Answer: You should block UDP port 69 to block TFTP
I Hope This Helps You :-)
-Chris</span>
A. use split worksheet view to break the worksheet into different visible sections
<u>Explanation:</u>
Jason is working on a project that requires him to manage a huge amount of data. There are numerous instances when a user has to manage a huge amount of data within a single spreadsheet. It will cause trouble for the user to simultaneously access the data from more than one table in the same sheet.
To deal with this problem, Jason can track and compare this data as he works on the spreadsheet by using the split worksheet view to break the worksheet into different visible sections. The different sections provide a better view of the tables and data extraction and manipulation become easy.