COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
illegal software used to steal passwords
|
|
software used to gather information about individuals
|
|
a type of input device
|
|
a type of virus
|
Detailed explanation-1: -Data harvesting refers to collecting information from various sources, like websites, apps and social media platforms, into a database to draw inferences.
Detailed explanation-2: -Data harvesting is a process that copies datasets and their metadata between two or more data catalogs-a critical step in making data useful. It’s similar to the techniques that search engines use to look for, catalog, and index content from different websites to make it searchable in a single location.
Detailed explanation-3: -Case Studies, Checklists, Interviews, Observation sometimes, and Surveys or Questionnaires are all tools used to collect data.
Detailed explanation-4: -Google Forms. 4.7 (10140) Create custom forms for surveys & questionnaires. Tableau. 4.5 (2105) Business intelligence & analytics. Qlik Sense. 4.4 (233) End-to-end data analytics platform. Wufoo. 4.4 (205) The Online Form Builder. Looker. 4.6 (192) Analytics Evolved. Startquestion. 4.9 (170) Kommo. 4.4 (147) Castor EDC. 4.7 (130) More items