1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
4 years ago
15

In peer to peer systems, the guarantees offered by conventional servers may be violated by:(a) physical damage to the host;(b) E

rrors or inconsistencies by system administrators or their managers;(c) successful attacks on the security of the system software;(d) hardware or software errors.Give two examples of possible incidents for each type of violation. Which of them could be described as a breach of trust or a criminal act? Would they be breaches of trust if they occurred on a personal computer that was contributing some resources to a peer-to-peer service? Why is this relevant for peer-to-peer systems?
Computers and Technology
1 answer:
gayaneshka [121]4 years ago
4 0

Answer:

Check the explanation

Explanation:

The two examples for each type of violation:

A) Power failure and Act of sabotage

B) Accidental deletion of file and Permission failure

C) Tampering of data, Denial of service attack

D) Failures of HDD (hard disk) and finding program bugs.

Note:

There is a difference in trusted behavior for pc's and servers are relevant because pea-to-peer system must be designed to cope with the looser interpretation of trust for pi s

You might be interested in
Disadvantages of using social network site GOAL SETTTING?
andriy [413]

Answer:

addiction, mental illness, misleading information, scams, cyberbullying

Explanation:

4 0
2 years ago
How do IT security workers help business
Elodia [21]
They code and learn how to go in the inner and deeper parts of the computer
6 0
4 years ago
Martha and her project group want to present the class their work in the form of a slideshow that includes charts. Which applica
Gennadij [26K]

Answer:

Your answer is D.  multimedia software

Explanation:

6 0
3 years ago
State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external
prisoha [69]

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

  • External fragmentation may need a lot of compaction and it is an expensive operation.

  • The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

  • Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

brainly.com/question/23636593

4 0
2 years ago
Consider an implementation of the instruction set architecture P1 has a clock rate of 4.8 GHz and CPIs (Cycles Per Instruction)
Anestetic [448]

Answer:

a) 3.3

b) 3

Explanation:

1)

As we know ,

CPI = sum of ( instructions× clock cycle)

     = 50%(1) + 30%(4) + 20%(8)

    = 50% + 120% + 160%

    = 330%

    = \frac{330}{100} = 3.3

⇒CPI = 3.3

2)

Let a = number of cycles on average

As given,

a 10% improvement in performance of P1,

⇒New CPI = 3

⇒3 = 50% + 30% (x) + 20%(8)

⇒3 = 50% + 30% (x) + 160%

⇒3 = 210% + 30%(x)

⇒3 = 2.1 + 0.3x

⇒3 - 2.1 = 0.3x

⇒0.9 = 0.3x

⇒x = \frac{0.9}{0.3} = 3

⇒x = 3

∴ we get

Number of cycles on average = 3

6 0
3 years ago
Other questions:
  • What is the last step when creating a maintenance schedule? develop a reminder system read the manuals log the maintenance compl
    6·1 answer
  • The process of debt servicing involves paying off ___________.
    13·1 answer
  • What are parts of the prewriting process
    13·1 answer
  • Hi can yall tell me if my answers r right or wrong and if they are can u tell which ones r correct. And plz explain only if you
    14·1 answer
  • It is important to remember that in a supply? chain, the only source of revenue is the? _______.manufacturer/customer/raw materi
    9·1 answer
  • Create a class named Circle with fields named radius, diameter, and area. Include a constructor that sets the radius to 1 and ca
    7·1 answer
  • Select all the ways in which business professionals might use a spreadsheet in their jobs.
    15·1 answer
  • Help Me Please, Ill mark whoever has the best answer with brainliest.
    14·1 answer
  • They are correct? thank you!
    5·1 answer
  • Which of the statements below are true? Which are false?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!