This sounds like a multiple choice answer can I have 4 choices to pick?
Answer:
For 32 bits Instruction Format:
OPCODE DR SR1 SR2 Unused bits
a) Minimum number of bits required to represent the OPCODE = 3 bits
There are 8 opcodes. Patterns required for these opcodes must be unique. For this purpose, take log base 2 of 8 and then ceil the result.
Ceil (log2 (8)) = 3
b) Minimum number of bits For Destination Register(DR) = 4 bits
There are 10 registers. For unique register values take log base 2 of 10 and then ceil the value. 4 bits are required for each register. Hence, DR, SR1 and SR2 all require 12 bits in all.
Ceil (log2 (10)) = 4
c) Maximum number of UNUSED bits in Instruction encoding = 17 bits
Total number of bits used = bits used for registers + bits used for OPCODE
= 12 + 3 = 15
Total number of bits for instruction format = 32
Maximum No. of Unused bits = 32 – 15 = 17 bits
OPCODE DR SR1 SR2 Unused bits
3 bits 4 bits 4 bits 4 bits 17 bits
Answer:
Answer is - cell, - column, - string value
Explanation:
- <em>Cell - this is often referred to as the intersection of a single row and column. </em>
- <em>Column - this is a group of cells which are represented vertically. </em>
- <em>String - these are values that are inside the cell which are represented through texts or group of letters including acceptable symbols and characters.</em>
Answer:
True
Explanation:
Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.
Rootkit tools:
1. Keyloggers
2. antivirus disablers
3. password stealers
4. banking credential stealers
5. bots for DDoS attacks