It is called computer forensics.
Answer: A. Voice over Internet Protocol
B. It reduces the delay for all objects requested by a user.
Explanation:
Voice over Internet Protocol is used to transfer voice communication and multimedia over the internet. It converts voice into a digital signal, transfers it over the internet and then reconverts it to voice when it reaches its destination.
Web Caching stores the data from a web page for reuse at a later time, this helps to reduce the tasks the server carries out and reduces delay. Because some objects are cached, more resources can be focused on objects that are not thereby reducing delay for all objects requested by a user.
Answer: Daughter board
Explanation:
A daughter board is refers to the circuit board and it is basically connected to the motherboard directly without any interruption.
It is also known as a daughter card which plugs and then extended the circuitry by connecting with the another circuit board. A mezzanine card and the riser card are the examples of the daughter board that used in the system.
According to the question, the riser card basically plus into the unique socket or the slot in the board and this is known as the daughter board.
Therefore, Daughter board is the correct answer.
Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.
Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".
Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.
Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.
Suppose an AI scientist designed a robot to ring an alarm for food. If the clock strikes 1, the robot displays a message “Time for lunch.” It displays such messages at breakfast and dinnertime, too. What kind of agent is the robot?
A. model-based reflex agent
B. goal-based agent
C. utility-based agent
D. simple reflex agent