41. Here are the External Peripherals of a Computer systems:
Output devices - devices that communicate the results of the data processing to the user
-> Printer
-> Monitor
Input devices - device that communicate the results of the data processing to the computer system
-> Keyboard
-> Mouse
Storage devices - device are those device that stores data.
-> Flashdrive
-> external hard drive
This devices that were mentioned are found on the external part of the computer system that’s why it is called external peripherals.
The answer is adding a random prefix to the key names. One way to introduce randomness to key names is to add hash string as prefix to the key name. for example, you can compute an MD5 hash of the character sequence that you plan to assign as the key name. from the hash, pick a specific number of characters and add then as the prefix to the key name. The casualness of the prefix more consistently distributes key names through multiple index partitions.
the answer is d plz let me know if i got it right
Answer:
Option (A) is the right answer.
Explanation:
The following terms can be described as :
Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.
Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.
Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.
Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.
According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.
No it can not .............