1) You are having access to your home page over the server. Accidently, you find out that if you will hit a particular key, you can enter into someone else’s files. You give just a few minutes looking around. Whether this is known as hacking? Explain it in detail.
2) Explain the factors in selecting the suitable data type for some value? Which of these is most significant? Describe your answer.