Answer:
yes computer do more good also if we use safely if we don't use safely computer harm also
Answer:
The first one I'm sorry if I'm wrong
Solution :
It is given that :
The digits 0 through 9 in hexadecimal have their usual meanings. But letters A through F function like the digits and it means digits 10 through 15, respectively.
Now the base of a hexadecimal is 16.
Now we know from 0 to 9 A, B, C, D, E, F
Now the maximum two digits hexadecimal numbers are = F F
So, F F
= 255
Complete Question:
Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they’re allocated on an “as requested” basis. Soon the following sequence transpires:
1. P1 requests drive 1 and gets it.
2. ____
3. P1 requests drive 2 but is blocked.
4. P2 requests drive 1 but is blocked.
a.P1 requests drive 2.
b.P2 requests drive 2 and gets it.
c.P2 requests drive 1 but is blocked.
d.P1 releases drive 1.
Answer:
Soon the following sequence transpires:
P2 requests drive 2 and gets it.
Explanation:
A deadlock is a condition where two computer programs allocate the same resource essentially prevent access by each other and both programs stop working.
When every process or thread is awaiting for a resource to be released which is managed by another process a number of processes or themes are blocked.
Here is an example of a deadlock scenario. All connections are blocked; everybody hopes to see an incident that never takes place.
Answer:
Confidentiality and availability- interruption, integrity - modification and fabrication.
Explanation:
Data on a network is provided with the three As in security, accountability, authentication and authorisation to promote the confidentiality and integrity of data on the network.
When a data is interrupted by a DOS attack, it is exposed to the attackers and the data transfer is interrupted. With this, the attacker can modify the existing data or fabricate a new data to sent to the network, crippling the integrity of the network data.