Answer:
The correct answer for the given question is "Machine languages can be used to write programs that can run on any machine."
Explanation:
The machine language consist of binary digit i. e 0 and 1 .Computer can understand only the machine language .The machine language consist of code that is written in bits so it is used to express algorithms.When any program is compiled the compiler are converted into machine code so the machine language is produced by the compiler .
Machine language cannot used to write a program that run on any machine.
Answer:
TRUE
Explanation:
A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.
Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.
Rootkits work by using a process called modification (the changing of user account permissions and security).
Rootkits are not malware themselves, but rather a process used to deploy malware on a target.
Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.
Answer:
Following are the difference to this question:
Explanation:
IPv4:
The
is uses the packet changed method, that is a Link Layer networks(like Ethernet). It has 4.3 billion addresses capacity. It uses the 32-bit logical device address, that written in decimal language.
It is divided by 4 bytes E.g. 192.168.1.1
The host part and network part are 2 parts. For a network, the host part may vary, while for the entire subnet, the network part remains equal.
The scheme of 232 addresses is available on application depends on security.
IPv6:
The IPv6 is used in the internet protocoland it is higher than IPv4. It can provide endless number Opf addresses, and use to solves the problem of IPv4 exhaustion and satisfies the demand for rising networking.
IPv4 Substitutor Built to meet more IP address requirements. In the Logical address of 128-bit Written hexadecimally and with colons divided, and the Space of 128 addresses are required. IPsec is an integrated security feature.
Answer:
e(a) = 0
e(b) = 10
e(c) = 110
e(d) = 1110
Explanation:
The Worst case will happen when f(a) > 2*f(b) ; f(b) > 2*f(c) ; f(c) > 2*f(d) ; f(d) > 2*f(e) and f(e) > 2*f(f).
Where f(x) is frequency of character x.
Lets consider the scenario when
f(a) = 0.555, f(b) = 0.25, f(c) = 0.12, f(d) = 0.05, f(e) = 0.02 and f(f) = 0.005
Please see attachment for image showing the steps of construction of Huffman tree:- see attachment
From the Huffman tree created, we can see that endcoding e() of each character are as follows:-
e(a) = 0
e(b) = 10
e(c) = 110
e(d) = 1110
e(e) = 11110
e(f) = 11111
So we can see that maximum length of encoding is 5 in this case.
Another name for a blue screen error is Blue screen of death