Answer:
They also gave suggestions on some modules and said they would like to work with his team in the future.
Explanation:
This statement suggests feedback because, here the client gives Richard and his team some suggestions on what they can do with the modules. It implies that the client must have tested the software application and observed its functionality.
Answer:
A. Source code
Explanation:
In the field of Programming; Source code is the code written in high level language given to the computer to translate to machine - executable code before executing. It is usually written and understood by human. It is closer to human like language, as it allows easier expression. It is mostly consist of english-like statement.
So, Erik would primarily be writing source code when performing his daily tasks since his daily task require high level of computer programming and internet knowledge.
Answer:
Data Confidentiality
Explanation:
A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.