Answer:
B. Someone can steal the information and hurt you.
Explanation:
People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.
Answer:
b) White-hat hacker
Explanation:
This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out based on a agreement between the whihte-hat hacker and the client via a contract.
Answer:
your friend just sent you 32 bits of pixel data (just the 0s and 1s for black and white pixels) that were encoded after sampling an image. Choose the two statements that are true.
------------------
The 32 bits of pixel data is enough to produce the image using the widget. Nothing else is needed.
------------------------
The digital image would be an exact copy of the analog image.
-----------------------------The correct width and height must be input into the pixelation widget to produce the image.
---------------------------The fact that only 32 bits were used to represent the image indicates relatively large sample squares were used. The digital image may vary from the analog image significantly
Explanation:
I don’t understand. Please tell me the question
Answer:
IDE hard drives <em>(Integrated Drive Electronics)</em> aka <em>(PATA) </em>or <em>"Parallel ATA"</em> <em>(Advanced Technology Attachment)</em>, were the previous standard before SATA which are faster; IDE drives are disposed with 41 to 44 pins, and they normally use 5V; although to certain extent small laptop 2.5" drives need only 5V, some of them also need 12V; and 3.5" drives require 12V plus 5V for the motor and logic.
Thereby the most suitable answers are <em>B.)</em> &<em> E.)</em> ,
5V and 12V respectively.