Answer:
A) True
Explanation:
Industrial espionage utilizes both illegal and unethical methods in gathering information about a corporate organization in order to get business intelligence. This involves stealing intellectual property and trade secrets to use them for a competitive advantage. because Information about company's products, services, finances, sales, etc can be toold for economic warfare
The OS shell allows access to the operating system services
Answer: Find answers in the attachments
Explanation:
Answer:
Following are the program in the Python Programming Language.
#set the infinite while loop
while(True):
#get string input from the user
name=input()
#get integer input from the user
num=int(input())
#set the if statement to break the loop
if(num==0):
break
#otherwise, print the following output
else:
print("Eating {} {} a day keeps the doctor away.".format(num, name))
<u>Output</u>:
oranges
5
Eating 5 oranges a day keeps the doctor away.
apple
0
Explanation:
<u>Following are the description of the program</u>:
- Set the loop that iterates at infinite times and inside the loop.
- Declare two variables which are 'name' that get string type input from the user and 'num' that get integer type input from the user.
- Set the if conditional statement for break the infinite while loop.
- Otherwise, it prints the following output.
Answer:
7 bytes
Explanation:
<u>2 Address Instruction</u>
The 2 address instruction consist 3 components in the format.
One is opcode,other two are addresses of destination and source.
<u>Example-</u>
load b,c | Opcode destination address,source address
add a,d | Opcode destination address,source address
sub c,f | Opcode destination address,source address
Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.
(1+3+3) bytes=7 bytes