<u>Explanation:</u>
a.
- One user can read the private data of another user-privacy.
- One user can prevent another user from getting anything done-denial of service.
Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.
b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.
Answer:
A business' ability to communicate with its employees, customers and associates changed dramatically when the Internet yielded new communication tools. Email and instant messaging have changed the face of business communication.
Answer:
Keeping the numeric values in a list makes it easier to apply the same computation to every data element.
Explanation:
A list or array in programming is a data structure, that has the location for each item it holds indexed. It eliminates the need to constantly create a variable to compute items of the same data types.
The list can store items of the same data type and iterate over them to compute the same calculation on each of them.
Answer:
a. True
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be subjected to frequency analysis.
The Playfair Cipher is generally considered to be the best multiple letter encryption cipher because it processes digrams in the plaintext as singular units and translates them directly into ciphertext digrams.
In the Playfair Cipher, a 5 × 5 matrix comprising of letters is developed using a keyword and then, the matrix is used to encrypt the plaintext as a pair i.e two letters at a time rather than as a single text.
Answer:
35
Explanation:
We will be going inside B array, because he was in second place in array E,and will be the first element of array B, so it's 35
E can be understanded as:
E=[[21, 'dog', 'red'],[35, 'cat', 'blue'],[12, 'fish', 'green']], so, you can see array E as array of arrays or so-called two-dimensional array