False
Not all IT services are equally critical. In an increasingly
digital world whereby cyber threats are a big threat, it is vital to prioritize
the critical assets in order to achieve digital resilience. This involves
building tighter defenses in systems that are critical.
Answer:https://www.khanacademy.org/computer-programming/lava-the-impossible-game-by-swax97/4638717300965376/embedded?id=1436456095000-0.5&origin=undefined&buttons=yes&embed=yes&editor=no&author=yes
Explanation:
Answer:
B. The process will be terminated by the operating system.
Explanation:
When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.
So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.
Answer:
- RFID tags in shopping mall.
- Browsing the internet.
- Mobile phone calls
Explanation:
Radio frequency identification tag (RFID) in a device that holds personal information of a user electromagnetically. it is used in shopping mall, installed in the shopper's phone or a card, in which all payments are done automatically.
The internet is a global network of devices. With a subscription to a internet service provider, a user can surf the internet at any time of the day.
Mobile phones are portable devices, procured by a user for on-the-go calls. This cell phones have databases with information of cell tower connections, for easy switching for flexible but quality call adaptation.