Answer:
A) Transmission of letter, message and memos over a communication network
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is e-mail (electronic mail).
An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.
Hence, electronic mail is a transmission of letter, message and memos over a communication network. Some examples of the commonly used electronic mails platform are Yahoo, G-mail, etc.
Answer:
Information assurance
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms
Answer is CPU cache
Explanation: A CPU cache is a special high-speed memory which is smaller and faster, and which helps to store copies of data from main memory location which are often used. It is actually located quite close to the processing core, and is used by the CPU of a computer to save time and energy in accessing data from the main memory.
The way it works is if the processor is either trying to read from or write to a particular location in the main memory, it checks to see if the data from the location is already in a cache, if it is, then it alternatively read from or write to the cache; which faster, instead of the main memory.
Please let me know if this helps.
The answer to your question is b crowding out effect
Answer:
Recycle Bin - Used to delete files. Deleted files can be restored or deleted permanently from the computer.
File Explorer - Used to access all sorts of files on the computer. Some are system made and others are added by the user, like video games or pictures.
Explanation: