1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
4 years ago
14

vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa

lse
Computers and Technology
1 answer:
Nookie1986 [14]4 years ago
3 0
Hi
i just saw this question and i like to answer it
true
You might be interested in
Which of the following is NOT a period of the Middle Ages?
frez [133]
High middle ages is the answer
5 0
3 years ago
onsider a file system on a disk that has both logical and physical block sizes of 512 bytes. assume that the information about e
anygoal [31]

For three disk allocation strategies (contiguous, linked, and indexed),

in this case, the  physical blocks must be read from the disk are 1,4 and 2 respectively.

In the disk, every block has a sequential number. The majority of disks today do logical I/O in hardware. Physical I/O is seldom ever required of operating systems today.

File access uses virtual I/O. Similar to disk logical I/O is disk virtual I/O. The distinction is that with virtual I/O, as opposed to physical I/O, the blocks that make up a file are

You could want to transfer from virtual block 10 to virtual block 4 in a contiguous allocation. Since the file is contiguous and you are at logical block 10 + Z, block four can be accessed by reading logical block 4 + Z. Without any intermediaries, that can be done directly.

Each block in the linked structure has 511 bytes of data and one byte that serves as an offset to the following block.

Read the first block, determine the offset to the second block, read the second block, determine the offset to the fourth block, and then read the fourth block in order to gain access to the fourth block.

If blocks are numbered from 1 to 10, then then is the "4" correct. The remainder of the solutions, however, make the assumption that block numbering begins at 0, using division to obtain offsets.

Assume there is a contiguous index for the indexed way of allocating files. Once more, it is assumed that each offset in the index is one byte in size.

Let's say that Z serves as the index's origin. Then, the byte at block Z + 3 DIV 512 and the offset at 3 MOD 512 (3 = 4 - 1) make up the entry for block 4 (numbered 1 to 4).

You must read the index and the data block in order to locate the block (2 reads).

To learn more about disk allocation strategies click here:

brainly.com/question/15083707

#SPJ4

4 0
1 year ago
When installing a SATA hard drive, is it true or false that you need to move the jumpers on the back of the drive to instruct th
antiseptic1488 [7]

Answer:

This is false.

Explanation:

SATA drives do not have jumpers, because they don't use the master/slave feature. They are connected to the motherboard, and they are ready to work.

The master/slave feature was used by IDE hard drives.15 years ago, most motherboards didn't have too many IDE slots to place more than 1 or 2 HDDs, the IDE cable allowed you to connect 2 drives to 1 cable, greatly increasing your computer's storage space.

It was recommended to set as master the drive connected directly to the motherboard, and the other one as slave.

7 0
3 years ago
Dwayne Alexander is working on a project promoting a fictitious product for his marketing class. He wants to use animation to sh
erastova [34]

The following are examples of animation apps:

  • Toon Boom Animation (2-D)
  • Prisma3D (3-D) and
  • AnimeTok (3-D)

<h3>What are the Pros and the cons of each app listed above?</h3>

Toon Boom Animation Pros:

  • It has a great set of tools
  • It has camera angles functionality
  • Has a vector drawing tool

Cons:

  • It is expensive.

Prisma3D (3-D) Pros:

  • It is good for modeling;
  • Easy to use interface

Cons:

  • It has too many bugs.
  • lacks sculpting tools

AnimeTok (3-D) Pros:

  • It makes it easy to move the characters easily
  • It is easy to understand

Cons:

  • It has too many ads
  • does not have an undo and redo button

Learn more about Animation Apps at:
brainly.com/question/7279789

6 0
2 years ago
Computer design software requires __________________ to be used properly and successfully by architects.
murzikaleks [220]
<span>The answer is letter B. An arrangement of directions and related documentation that instructs a PC or how to play out an undertaking or it can mean all the product on a PC, including the applications and the working framework. I hope the answer helps. </span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an example of a logic bug?
    8·1 answer
  • *****NEED HELP ASAP!!!! COMPUTER HELP!!!! PLEASE!**
    13·1 answer
  • What are five features of word 2016 you would use to capture the attention of the target audience? Defend you decisions
    9·1 answer
  • When you write a C# program that stores a value in a variable, you are using temporary storage; the value you store is lost when
    12·1 answer
  • Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
    6·1 answer
  • A business would use a website analytics tool for all of the following EXCEPT _____.
    9·1 answer
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • Whose job is it to ensure that a group stays focused and on schedule?
    8·1 answer
  • ¿En qué año se funda lego?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!