Answer:
- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.
Explanation:
Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.
Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.
Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.
Dang, that's cool, but nobody really cares that you two have something going online
Answer:
Option A: It includes letters and numbers.
Explanation:
ASCII is the abbreviation of American Standard Code for Information Interchange. This is a character encoding standard to represent letters (upper case and lower case), numbers and special characters (e.g. & and %). This is an encoding standard which is recognized by all computers that enable the exchange of information between different computers become possible.
For example, an uppercase A is represented as number 65 in ASCII code.
Answer: - scan and convert to pdf app.
- timetable managing app.
- color seeing app (for color-blind people.)
- virtual clothing/jewelry try on.
Explanation:
Answer: A polaroid
Explanation: I have all these cameras