Answer:
- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.
Explanation:
Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.
Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.
Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.
Answer:
A file extension or file name extension is the ending of a file that helps identify the type of file in operating systems, such as Microsoft Windows. In Microsoft Windows, the file name extension is a period that is often followed by three characters but may also be one, two, or four characters long.
Explanation:
Answer:
The answer is explained below
Explanation:
They are many features in photoshop that allow for nondestructive editing of images, these are:
- Dialog box: It also for the user to undo an activity to the last change
- Layer: It contain data that can be adjusted to change the appearance of an image.
- Mask: It protect a designated portion from changes you want to make.
- Smart Objects: It allows for the editing of an image without altering or damaging the original image
- Revert: It allows you to go back to the original image as it was when you opened the document.
- Crop: After cropping an image you can choose to hide the cropped part instead of deleting it.
There are about 15,000,006
Answer:
The tool that allows to configure a custom console is "mmc.exe".
Explanation:
MMC is a Microsoft Management Console. It is used to customize the management console and add the tools in console that are required by the technician.