Answer:
blank 4
Explanation:
I just did this assignment got 100
Answer:
See my explanations and attachment
Explanation:
Construct an 8k X 32 ROM using 2k X 8 ROM chips and any additional required components. Show how the address and data lines of the constructed 8k X 32 ROM are connected to the 2k X 8 chips.
I tried to solve it but I am not sure if I got the correct answer. Could anyone check my drawing and correct me?
<em>How does multithreading affect the throughput of a GetFile Server hosting many very large files?</em>
Answer:
It create multiple threads of large file which eventually causes in slowing down the speed of server which results in slower response time.
<em>How does multithreading affect the average response time for a GetFile server hosting a few small files?</em>
Answer:
Multiple threads in smaller files result in rapid response time and enormous process speed in small files.
Answer:
Spyware
Explanation:
Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.
Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.
Bot: this is a software application that runs automated tasks. So, it is not the correct option.
Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.
Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.