Solution :
'AND" operation is a logical operation and is used in logical connective combining two statements and in truth tables.
Using AND operation verifies whether the outcome P and Q is true only when both the P as well as Q are true. If one of the P or Q is not true, then outcome result will be false.
In the context, Kamal wishes to offer a new and more favorable contracts to the business customers who use a wireless services and receive a discount.
Therefore, using the AND operation of the customers as :
Customer Wireless Discount Outcome
A N N FALSE
B Y N FALSE
C N Y FALSE
D Y Y TRUE
Answer:
1. DLL Files.
2. System software repair.
3. Software configuration.
4. Human-computer interaction.
5. A graphical user interface (GUI).
Explanation:
1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.
2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.
3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.
4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.
5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.
Answer:
B. Balanced depending and the type of questions
Answer:
True
Explanation:
Computer security is basically divided into three main areas:
- Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
- network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
- digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.
Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.
Answer:
Check the explanation
Explanation:
#define _MULTI_THREADED
#include <pthread.h>
#include <stdio.h>
#include <errno.h>
#define THREADS 2
int i=1,j,k,l;
int argcG;
char *argvG[1000];
void *threadfunc(void *parm)
{
int *num;
num=(int*)parm;
while(1)
{
if(i>=argcG)
break;
if(*num ==1)
if(argvG[i][0]=='a' ||argvG[i][0]=='2'||argvG[i][0]=='i' ||argvG[i][0]=='o' ||argvG[i][0]=='u')
{
printf("%s\n",argvG[i]);
i++;
continue;
}
if(*num ==2)
if(!(argvG[i][0]=='a' ||argvG[i][0]=='2'||argvG[i][0]=='i' ||argvG[i][0]=='o' ||argvG[i][0]=='u'))
{
printf("%s\n",argvG[i]);
i++;
continue;
}
sched_yield();
}
return NULL;
}
int main(int argc, char *argv[])
{
pthread_t threadid[THREADS];
int rc=0;
int loop=0;
int arr[2]={1,2};
argcG=argc;
for(rc=0;rc<argc;rc++)
argvG[rc]=argv[rc];
printf("Creating %d threads\n", THREADS);
for (loop=0; loop<THREADS; ++loop) {
rc =pthread_create(&threadid[loop], NULL, threadfunc,&arr[loop]);
}
for (loop=0; loop<THREADS; ++loop) {
rc = pthread_join(threadid[loop], NULL);
}
printf("Main completed\n");
return 0;
}
The below attached image is a sample output