Answer: B
The internet would allow businesses to easily expand globally with the help of social media and the ever expanding resources being poured onto the internet, reaching customers anywhere in the world.
I should be skeptical of the credibility of sources that I have during the gathering. Be cautious and make sure that data comes of from trusted specialized sources. Trusted sources can be easily identified for their popularity on certain fields. Determine the purpose of the site and the data it contains.
Answer:
d) Social networking sites
Explanation:
-Intranet is a network that is created by an organization to share information, tools and different services inside the company.
-Wikis are websites used to share content and knowledge and different users can modify the information.
-VoIP is a technology that allows you to make calls over the internet.
-Social networking sites are online platforms that allow people to connect with organizations and other people, create communities online and share different types of information.
-Unified communications is a system that has different communication methods through a single application.
According to this, the collaboration technology that is becoming more and more popular within organizations because it provides a means for forming ad hoc groups, networking and locating potential business allies is social networking sites.
Answer:
Binary to Gray Code Converter
The logical circuit which converts the binary code to equivalent gray code is known as binary to gray code converter. An n-bit gray code can be obtained by reflecting an n-1 bit code about an axis after 2n-1 rows and putting the MSB (Most Significant Bit) of 0 above the axis and the MSB of 1 below the axis.
The 4 bit binary to gray code conversion table is given in attached file.
Answer:
TEARDROP
Explanation:
Teardrop is a form of attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself .
Teardrop attack also involves sending fragmented packets to a target machine in which the victim is been tricked into sending messages to and from itself. One of the fields in an IP header is the “fragment offset” field, indicating the starting position of the data contained in a fragmented packet relative to the data in the original packet.