Answer:
Explanation:
1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)
2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)
3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)
4. A software program specifically designed for computer forensic investigations - (EnCase)
5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)
6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)
7. Malicious software similar to a computer virus -- (_worm)
8. Federal legislation aimed specifically at computer crime (CFAA)
They typically use the 50-60 Hz oscillation of AC power or a 32,768 hertz Chrystal oscillator to keep time. <span />
Exercise Breathe deeply Take breaks Study at night
Answer: The shell sort is based on insertion sort. Here the list of elements are divided into smaller sub list which are sorted based on insertion sort.
Its best case time complexity is O(n* logn) and worst case is O(n* log^2 n)
Explanation:
Shell sort is an inplace sorting here we begin by dividing the list into sublist and sorting the list with insertion sort. We create interval for dividing the list into sub list until we reach the smallest interval of 1.
The best case is O(n* logn).
Most computers have three types of ports: serial, parallel, and USB. A serial port is a type of interface that connects a device to the system unit by transmitting data only one bit at a time. Serial ports usually connect devices that do not require fast data transmission rates, such as a mouse, keyboard, or modem.