Answer:
a. True
b. False
c. False
d. True
e. True
f. True
g. False
h. True
i. False
j. False
Explanation:
Polling is a technique in which users are connect externally and programs are run by synchronization activity. The users are allowed to set flags for devices which are periodically checked. The end user can implement system calls using the polling technique.
I believe A is the answer here.
Answer:
The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .
Explanation:
The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .
GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .
GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.
GCED :This certification is also providing the knowledge of security as well as networking.
Difference between GIAC and InfoSec certifications is given below
- The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
- The SANS is including the certification of GIAC certification where as the InfoSec certifications is including the CISSP and SSCP certification .
Answer:
Prolog program are used in the artificial intelligence and the web development in a systematic manner process. As, it is also sometimes known as declarative language which basically consist of some facts and list. Prolog program are divided into the sections that are:
- Domain sections
- Clauses sections
- Predicates sections
- Goal sections
We need each section of the prolog program because all the sections introduced the systematic program and performed there particular functions so by using all these processing steps an efficient function are formed.