Answer:
  The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system. 
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.   
 
        
             
        
        
        
Credit cards do charge the most interest
        
             
        
        
        
Answer:
zeroIt(&x);
Explanation:
The statement that sets the value stored in x to zero by invoking the function zerolt is given below
zeroIt(&x);
The zeroIt function is also given below for better understanding.
void zeroIt(int *x) {
    *x = 0;
}
As seen, the function takes an argument with integer variable type, which is a pointer, denoted by the asterisk symbol (*x).
The ampersan sign (&x) is used to access the variable whose value can then be stored.
 
        
             
        
        
        
Answer:
Disadvantages of Batch Operating System:
- The computer operators should be well known with batch systems.
- Batch systems are hard to debug.
- It is sometime costly.
- The other jobs will have to wait for an unknown time if any job fails.
 
        
             
        
        
        
A small hard drive typically has only one platter, but each side of it has a magnetic coating. Bigger drives have a series of platters stacked on a central spindle, with a small gap in between them. The platters rotate at up to 10,000 revolutions per minute so the read-write heads can access any part of them.