Answer:
2. testing cybersquatting
Explanation:
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. In this case, phishing domain refer to a domain that is not a trustworthy one but try to deceive user into using it in place of the genuine domain.
Cybersquatting also known as domain squatting is registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses.
Identity theft is the illegal use of someone else's personal information in order to obtain money or credit. It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
From the above definition, it is seen that someone registering a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit is called testing cybersquatting.
Answer:
Pay attention in your class.
Explanation:
If you paid attention in your class, you would have at least a basic understanding of the material.
Answer:
Examples of Fact-finding techniques includes:
-
Prototyping
-
Questionnaires
- Research and sites visit
-
Interviews
Explanation:
It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.
<u>Prototyping
</u>
<em>Advantage:</em> enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.
<em>Disadvantage:</em> Training and Development cost consumes resources.
<u>Research and site visit </u>
<em>Advantage :</em> better time management if the problem has been researched upon before.
<em>Disadvantage:</em> appropriate permission is often needed before using research materials.
<u> Questionnaires
</u>
<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.
<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.
<u>Interviews</u>
<em>Advantage:</em> The body language of interviewees is been perceived.
<em>
Disadvantage: </em>Interviewing is time consuming and costly.
Hello <span>August1859
</span>
Answer: In a database, a key field is used to uniquely identify each record for retrieval or manipulation.
Hope This Helps!
-Chris
Answer:
Following are the answer to this question.
Explanation:
It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.