Answer: (A) SQL injection
Explanation:
Th SQL ( Structured query language) injection is the code injection method or technique that is basically used in data driven attack various applications. The SQL injections are basically used by hackers for attacking on various websites.
The SQL injection are used by the hackers to insert the malicious structured query language statement in the input state for the execution process in the database.
When we use the SQL injection during that process, the attacker can easily access and modify the database.
Answer: Buffered
Explanation: Buffered memory is the memory contains registers between the modules of dynamic random access memory(DRAM).It is also known as registered memory. The purpose of using buffered memory to increase the stability and decrease the electrical load.
Other options are incorrect because ECC(error correcting code)memory is for correction and detection of incorrect data, non- parity memory is that don't utilize ECC module and multi-channel used for the increment in the rate of transmission between memory controller and DRAM.
Thus,the correct option is option buffered memory because of serial communication pattern with memory controller and parallel communication technique with chips .
Explanation:
Tablets are more portable than any computer or laptop. They are very lightweight and can fit in a purse or small bag with relative ease. They are designed to be taken everywhere with you, thus the very definition of portable.
Storage Computer hard drives can be over one TB (terabyte). Even the most basic computer comes with a 250 GB (gigabyte) hard drive, which for many is more than enough storage for most users. Tablets come with built-in storage ranging from 8 GB to 128 GB. In some cases, an expansion slot may be available for adding additional storage.
Battery life The battery life even for the most efficient laptop is still not close to the battery life of a tablet. A tablet has a much smaller screen and has fewer components than a laptop computer, which makes for a longer battery life.
Operating System Desktop and laptop computers come with more fully featured operating system due to having the computing power and memory requirements. These operating systems support more than any tablet operating system. Tablets come with a more slimmed down operating system because of the limited computing power and memory. The Android OS and Apple iOS are adequate operating systems for tablet users, but not as complete as computer operating systems.
Boot time The latest computers running the latest operating systems have improved a lot on their boot time. However, are still slower than a tablet. Generally speaking, most tablets are much faster at booting than most computers.
Data entry and user input A computer uses a keyboard for data entry that most users are familiar with and comfortable using. The mouse is also available for easy scrolling and right-clicking. Tablets use an on-screen keyboard that is smaller than a standard computer keyboard, takes time to learn, and users with bigger fingers may have a hard time typing. Some tablets allow for an external keyboard, providing a more comfortable and familiar medium for typing.
Touch screen Although some laptops and desktops now support touch, most still have no touch screen support. All tablets support a touch screen, that's easier for new computer.
Answer: There are different types of topologies are: 1) Bus topology, 2)Star topology, 3)Ring topology
Explanation: The physical layout in which the network connection are made is known as topology.
Types of topologies are explained as:
1) Bus topology-
- It is a type of network where every device is connected to a single cable, which runs one end to another.
- In this data is transmitted in one direction only and it is also known as linear bus topology.
- It is cost effective because they can be run in a single cable.
2) Star topology-
- In star topology every node in the network is connected to one central node.
- The central node or hub also acts as a repeater and it can manage the entire network from one location.
3) Ring topology-
- In this topology computers are connected to each other in circular format and every device in a network will have two neighbors.
- In this the risk of collision is very low and low cost to install.
If Anna is using a Windows computer she should press the keys [Windows Flag] + [R] on her keyboard.