Answer:
5,10; 6,12; 7,14
Explanation:
We will demonstrate the iteration of the loop:
First iteration: Number = 7, Count = 5 at the beginning. We will check if Count <= Number? Since it is correct, prints 5,10. Increment the Count by 1.
Second iteration: Number = 7, Count = 6. We will check if Count <= Number? Since it is correct, prints 6,12. Increment the Count by 1.
Third iteration: Number = 7, Count = 7. We will check if Count <= Number? Since it is correct, prints 7,14. Increment the Count by 1.
Forth iteration: Number = 7, Count = 8. We will check if Count <= Number? Since it is not correct, the loop stops.
Answer:
c. nbtstat -a 193.145.85.202
Explanation:
Nbtstat is a TCP/IP utility which is used to display the current connections and statistics of TCP/IP using NetBIOS over TCP/IP (NetBT).
It is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed.
Also, it is very useful when we want to troubleshoot NetBIOS name resolution problems.
One can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address
Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Lsass.exe /................................................
Answer:
microsoft windows, macOS, and linux
Explanation:
if you need help let me know