<u><em>
Viruses,A tiny program that hacks a computer </em></u>
<u><em>
Steals information and personal data.It can disable your laptop.Viruses can be found in malicious sites.Criminals share these viruses to steal data from others.With a firewall,Hackers will be detected.</em></u>
<u><em>
</em></u>
<u><em>The general consensus is that there are no good viruses.</em></u>
Answer:
UDP Port 69
<em>Trivial file transfer protocol (TFTP) operates over UDP port 69.</em>
Explanation:
UDP port 69 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. This protocol when used over PORT 69 makes possible the transmission of a datagram message from one computer to an application running in another computer. UDP is used with <em>IP (the Internet Protocol)</em> and UDP Port 69 is <em>connectionless </em>which means it does not give reliable communication; it’s up to the application that received the message on Port 69 to process any errors and verify correct delivery.
When forced distribution is used to reduce leniency bias, this can cause <decreased trust> between employees if a pfp system is in place.
Answer:
b. lw $t4, 4($t0)
c. add $t3, $t5, $t4
Explanation:
Pipeline hazard prevents other instruction from execution while one instruction is already in process. There is pipeline bubbles through which there is break in the structural hazard which preclude data. It helps to stop fetching any new instruction during clock cycle.