Answer:
All flags are On ( c, z , N )
Explanation:
Given data:
4-bit operation
Assuming 2's complement representation
<u>Determine status flags that are on after performing </u> 1010+0110
1 1
1 0 1 0
0 1 1 0
1 0 0 0 0
we will carry bit = 1 over
hence C = 1
given that: carry in = carry out there will be zero ( 0 ) overflow
hence V = 0
also Z = 1
But the most significant bit is N = 1
A slow processors but the need more bytes
Answer:
b. May introduce the potential for a security breach using a backdoor programmed into software
Explanation:
muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.
las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.
Answer: annotation symbol
Explanation:
The symbol shown as a three-sided box that is connected to the step it references by a dashed line is referred to as the annotation symbol.
The annotation symbol is referred to as a flowchart symbol that is used to hold comments. It is a tag that's applied to a family so that the family can be identified in a project.