Answer:
c is the response hope it helps
The packet is
dropped or discarded. By default, a router will send packets
to a network that has been listed in the routing table. If it happens that the
network is not listed, the packet will be discarded or dropped. Packets that do
not have a default route or gateway of last resort are dropped.
The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.
<h3>What is DNS poisoning?</h3>
In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.
Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.
Learn more about hacker from
brainly.com/question/24956493
Database management systems are used to store and to access information.
In <span>the Relational Database Management System </span>(RDBMS), all the data is in the form of simple columns and rows in a table. Structured Query Language (SQL) is is the standard query language for RDBMS. Some of the disadvantages of RDBMS are: not enough storage area to handle data such as images, digital and audio/video, do not provide good support for nested structures,not much efficient and effective integrated support.
<span>The
term object oriented database management systems (OODBMS) refers to a wide variety of different database technologies
that were developed in order to overcome some of the limitations of
relational databases.</span>
Answer:
Hard Disk
Explanation:
A very important part of a computer is the hard disk. It stores data and documents that users may have downloaded. Removing the hard disk could make the computer useless.
A mouse, keyboard, or pen drive can be easily removed.
A mouse and a pen drive are USB-connected devices and can be removed by simply unplugging the cable. A keyboard can be removed by simply taking off the keycaps. It is easily accessible.
-Chetan K