Explanation:
i hope this is the right answer
!st generation computers were more big and bulky and you for sure could not bring them around everywhere.
Answer:
Tell her about cyber bullies
Tell her about hackers
stalkers
identity theft
spam
Sorry if wrong
Explanation:
Answer:
physical piece of hardware that connects to a primary device, such as a computer, in order to provide user input.
Explanation:
Answer:
Primary key:
A primary key is the collection of field value which persist unique value in the table. The primary key value can be use to represent the entire record throughout the table. In the database, each table only contain one primary key.
The purpose of the primary key is used to implemented the relationship within the two tables in the database. More explicitly the primary key is define as, primary key is "target" that the foreign key can easily referenced. It basically consist multiple attributes in the table.
Answer:
c) Trojan horse
Explanation:
A Trojan horse is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. Once installed, a Trojan can perform the action it was designed for.
If a set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program and it changes and updates the payroll file, then this instructions called a Trojan horse.
A trap door, also known as a back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.
A virus worm is a malicious, self-replicating program that can spread throughout a network without human assistance