Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
Answer:
i cloud
Explanation:
but if you dont gota paypal youd want to get like an std card or somthime
Internet Explorer 9+ is the web browser recommended to use with recorders.
<h3>What is a
web browser?</h3>
Anywhere on the internet is reachable with a web browser. It pulls data from other websites and shows it on your smartphone or computer. The HTTP Send Standard, which outlines how text, pictures, and audio are communicated on the web, is employed to transfer the data.
As we know,
Recorders are perfect for desktop applications because they can record a variety of items, including mouse clicks, scrolling, radio buttons, list boxes, checkboxes, and drop-down menus.
Thus, Internet Explorer 9+ is the web browser recommended to use with recorders.
Learn more about the web browser here:
brainly.com/question/19459381
#SPJ4
Answer:
Option b is the correct answer for the above question.
Explanation:
The DBMS is used to manage the information or data which is stored to use in the future. Any project has two sides one is the front end and the other is back-end. The front-end refers to the graphics which are visible to the user of the project but the data is not stored on the side of the project it is stored on any database software which can be called for the request of any event of the project. The database is stored on the backed of the project so to bring the data from the database, the process is known as back-end processing.
The above question wants to ask about the process of DBMS which is said to the back-end process because the DBMS process the data and to process the data is known as the back-end process. So Option b is the correct while the other is not because--
- Option 'a' states about front-end-processing which processes the design of the websites.
- Option c states about the file server which is said to the DBMS.
- Option d states about the management system which is not in the project.
Que es lo que quieres decir mi amigo