Answer:
Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it
Awww what happened? Sometimes its hard for me to keep a promise.
Explanation:
ok will do
I believe the answer is D. To keep records of transactions in different places.
Application and system software is created on user dimension.