Answer:
The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.
It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.
Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.
Explanation:
Answer: I didn’t have a “date”, I went with friends.
Flatbeds were prominently used up until the mid 90's and were replaced by non-linear software.
Answer:
Active Attack
• It is an active attack 1, because someone is actively attacking your system. It is also an active attack because it is affecting the way your system works negatively, and visibly.
• 2, because they have been caught for actively committing a crime.
• lastly, because a brute-force is classified as an active attack, regardless. It is an illegal way to attempt to damage, steal or change a root password.
•<em> Fun fact </em>
<em>A DDoS(distributed denial-of-service) is also classified as an active attack.</em>
Answer:
FULL neighbor state.
(FULL/DR or FULL/BDR)
Explanation:
The fact that the routers are neighbors is not enough to guarantee an exchange of link status updates; they must form adjacencies to exchange link status updates. Adjacency is the next step after the process of establishing neighbors. Adjacent routers are routers that go beyond a simple Greeting exchange and act in the database exchange process. To reduce the amount of information exchange in a given segment, OSPF selects a router as a designated router (DR) and a router as a designated backup router (BDR) in each multiple access segment. The BDR is chosen as the backup mechanism in case the DR fails. The idea behind this is that routers have a central point of contact for the exchange of information. In order to verify if two routers have established an adjacency, you can use the command: show ip ospf neighbor.
Here is an example:
R1#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
203.250.12.1 1 2WAY/DROTHER 0:00:37 203.250.14.3 Ethernet0
203.250.15.1 1 FULL/DR 0:00:36 203.250.14.2 Ethernet0
203.250.13.41 1 FULL/BDR 0:00:34 203.250.14.1 Ethernet0