Answer:
Spoofing
Explanation:
Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source
<span>One vital component of your professional behavior with regard to computing systems today is the creation of strong passwords.
It is very important to have a good password on your computer, especially if you are dealing with sensitive data and information. It would be for the best to create such a password which won't be hacked into easily, in case somebody wants to steal your data.
</span>
Answer:
Business intelligence.
Explanation:
That concept that applies to that of the selection, incorporation, evaluation, and analysis of companies or business information systems, software, and behaviors. It is direct at promoting good business decision-making.
This is a wide concept of software and technology to capture, store, analyze, and to provide information access to support users make far better strategic decisions.
Answer:
Shadow Projection
Projection is the externalization, or sending out, of unconscious aspects of yourself. These aspects include positive or negative needs, like the need for love or the need for control; unconscious feelings; and ideas you are not aware of having.
Explanation: