<h3>what is hub? </h3>
<h3>✅An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.</h3>
Answer
Hi,
The chief contribution of philosophy to artificial intelligence is the knowledge of the connections between the two and the understanding of the shared concept.
Explanation
Philosophy and Artificial intelligence has a close scientific connection because they both share concepts such as action, consciousness, epistemology and free will. From the artificial intelligence perspective, theories in philosophy are important in AI as long as they provide the basis of the designs, reasons and plan. The concepts shared in AI con tribute to the realization of the philosophy of artificial intelligence.
Hope this Helps!
Answer:
try this
Explanation:
MSG1 DB 10,13,'enter any string:-$'
MSG2 DB 10,13,'converted string is:-$'
P1 LABEL BYTE
M1 DB 0FFH
L1 DB?
P11 DB 0FFH DUP<'$'>
DATA ENDS
DISPLAY MARCO MSG
MOV AH,9
LEA DX,MSG
INT 21H
ENDM
CODE SEGMENT
ASSUME CS: CODE,DS:DATA
START:
MOV AX,DATA
MOV DS,AX
DISPLAY MSG1
LEA DX,P1
MOV AH,0AH
INT 21H
DISPLAY MSG2
LEA SI,P1
MOV CL,L1
MOV CH,0
CHECK:
CMP[SI],61H
JB DONE
CMP[SI],5BH
UPR: SUB[SI],20H
DONE: INC SI
LOOP CHECK
DISPLAY P11
MOV AH,4CH
INT 21H
CODE ENDS
END START
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.
The cloud is a network of computer linked by the internet to store information. Backing up file using cloud computing means that your files will be put on the cloud as an extra copy in case you lose them or such. The cloud will still have a copy to use.