Answer:
Tell her about cyber bullies
Tell her about hackers
stalkers
identity theft
spam
Sorry if wrong
Explanation:
You need to create a table for each entity, as the first transforming step for extending e-r model toward the relational design of database.
you can copy and paste your text.
<h2>
Answer:</h2>
Option D: They vary based on popularity and market demand of products designed with the language.
is the correct answer that best categorizes the state o programming languages over time.
<h2 /><h2>
Explanation:</h2>
With the advent of time, new programming languages are also introduced. But this doesn't means that the older ones are loosing or gaining popularity because of others. Changing or development of product design in the market tells us that the programming languages have their own specific properties on the basis of which they are used.
From this we can conclude that a programming language gets popular due to its specifications and features that may not get diminished by the features o other programming languages.
<h3>For example:</h3>
- Java script is used mostly to create desktop apps.
- C language is used widely in embedded systems and electronics.
<h3>I hope it will help you a lot!</h3>
Answer
Explanation:
Hacking is simply gaining access into a computer through weaknesses that were found in the network system.
We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.
These stages includes
1. Reconnaissance
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering tracks.