Answer:
CPU, input unit, Output unit, memory unit
 
        
                    
             
        
        
        
Answer:
Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.
Explanation:
The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.
And also, the use of high-performance computers makes these algorithms effective
 
        
             
        
        
        
Answer:
Output explanation to the given code can be defined as follows: 
Explanation:
In A the output is 0
, It will return fork value of the child process that is 0. so, 0 is printed during child process.  
In B the output is 2650
, in which the getpid() method returns the child process id  value that is 2650.  
In C the output is 140, As it is declared in key, all process have their own "value" copies. 20 are inserted during childhood, so 140 are written.  
In D the output is 2650, its fork() method returns the child ID to the parent process. so the value 2650 is printed.  
In E the output is 2600, Its getpid() method will returns parent process id  that is equal to 2600.  
In F the output is 120 Since the value is declared in primary, all process so their own "value" copies. 120 will be printed during process.