Answer:
In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term memory is often synonymous with the term primary storage or main memory. An archaic synonym for memory is store.
Answer:
It is supported by many different experiments.
Explanation:
Scientific theory is based on different experiments and tested in different situations and environment will all aspects. If the experiment finds true then observations will become theory. It can be changed in future if it does not meet the newly proposed conditions. But It does not means that, every theory can be changed.
Structures can be accessed from anywhere within the module or class in which they are declared. A structure is Friend by default. To specify the accessibility in more detail, include Public, Protected, Friend, Protected Friend, or Private in the Structure statement. You must declare every data member of a structure.
Answer:
the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer
Watchdog Program
This program becomes the number one security mechanism for file access.
Pros:
- A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
- You are assured of having secure access to your file
Cons:
- It becomes a bottleneck.
- If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.
COPS
COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.
Pros:
- This program provides methods of checking for common procedural errors.
- COPS collect outputs and either mails the information to the admin or logs it in.
Cons:
- It could be modified by an intruder or even take advantage of its features.
- It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.