Okay what do you need to know
Answer:
Independent variable is temperature
Explanation:
An equation has this form: Y= f(x), where Y is dependent variable andX is independent variable.
In this case Y ( Dependent variable) is Perfomance in test, an it depends on x(Independent variable) wich is temperature.
Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.
Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".
Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.
Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.
Answer:
Advanced persistent threat.
Explanation:
Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.
It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.
The answer is C ms-dos
Side note:
GUI means graphical user interface. In other words, that means it looks pretty and has cool buttons, animations and cute stuff. MS-DOS is just a black screen with words on it. Definitely not cute or cool.