Answer:
b) White-hat hacker
Explanation:
This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out based on a agreement between the whihte-hat hacker and the client via a contract.
Answer:
Correct answer is:
communicate the purpose of the code that follows it.
Explanation:
Let have a look at each option
comment should give the reader the background of the programmer.
Comments are unable to do so.
Be written on every line
No, it is not need as comment are useful only to explain difficult or complex part of code.
communicate the purpose of the code that follows it.
yes, this option is true, as comments will give hints to programmer about the piece of code.
give information about how many hours it took to write the code
No, comments can answer it,
Answer:
The image type is a bitmap image.
A bitmap image is made up of bits/pixels and color depth information on the each pixel. Bitmap images can be in JPEG, GIF, or SVG format.
In order to find out if this was a bitmap image, the method applied was to zoom in closely into the image and notice the tiny squares called pixels which come together to make the image.
Learn more :