Answer:
Fixed costs are those costs that do not vary with the level of production. While, variable cost are those costs that change with the level of production or per unit consumption. 
(a) Repairs to a leaking roof- Fixed cost as it has nothing to do with the level of production. 
(b) Cotton- Variable cost as it depends on the number of units produced.
(c) Food for the miller's cafeteria- Variable as it depends on production. The more you produce the more workers you need and thus more is the food requirement. 
(d) Night security guard-  Fixed cost as it does not change with the number of units produced by the textile mill. 
(e) Electricity- Variable cost as it depends on the units of electricity consumed. The more you produce the more electricity will be consumed. 
 
        
                    
             
        
        
        
The financial analysis component of a business plan is to describe the viability, stability and profitability of a business, sub-business or project.
<span>It is an aspect of the overall business finance function which includes the examining historical data to acquire information about the current and future financial health of a company, business or project.</span>
        
             
        
        
        
<span>In 1972, computer scientist Gordon Bell recognized that digital devices would change the world as they evolved and became widely used.
</span>Gordon Bell was an American electrical engineer and manager.<span> He was responsible for the first mini- and timesharing computers and is famous for his development of DEC's highly-successful VAX architecture.</span>
        
             
        
        
        
Answer:
The correct answer is Known vulnerabilities. 
Explanation:
An intrusion prevention system (or by its acronym in English IPS) is a software that exercises access control in a computer network to protect computer systems from attacks and abuses. Intrusion prevention technology is considered by some to be an extension of intrusion detection systems (IDS), but in reality it is another type of access control, closer to firewall technologies.