PRIMARY STORAGE STORES YOUR DATA AS LONG AS POWER IS OBTAINABLE. SECONDARY STORAGE IS INDEPENDENT OF POWER SUPPLY. OFF LINE STORAGE IS UNDER CONTROL OF CENTRAL PROCESSING.
Answer:
Please find the program in attachment.
The sample program is self explanatory, and with all the functions being listed as shown above.
And the sample program can be extended to allow three chances for authentication, and for all with addition of a simple for loop.
Explanation:
The code is self explanatory.
Answer: It would be the last three
Explanation: just did it on edge and got 100%
Answer:
The answer is B.
Explanation:
Message integrity and confidentiality might be compromised because it is possible to recover any key used more than once