Answer:
SSH, HTTPS and SMTP
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
Hence, SSH, HTTPS and SMTP are considered as secure network protocols.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.
Answer:
4 GB
Explanation:
<u>Determine the maximal size of a file </u>
100 direct block address
= 100 * 1024 = 102400
One single indirect block address
= 128 * 1024 = 131072
One double indirect block address
= 128 * 128 * 1024 = 16777216
one triple indirect block address
= 128 * 128 * 128 * 1024 = 2147483648
one quadruple indirect block addresses
= 128 * 128 * 128 * 128 * 1024 = 274877906944
maximal size of the file
= ∑ 102400 + 131072 + 16777216 + 2147483648 + 274877906944
= 4GB
I don't think some will write the whole program here, but which part are you having trouble with?
<span>Polymorphic message
Methods in different classes with a similar function are given the same name.
- Makes classes easier to use because programmers need to remember fewer method names.
- Employed as much as possible.
- Polymorphic message ex. is the toString method.</span>
Answer:
A network backbone connects multiple networks together, allowing them to communicate with each other.