Answer: Phishing
Explanation:
Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.
One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.
So Phishing is a for of identity theft.
Complete Question:
Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 4096-byte cache using 32-bit memory addresses, 8-byte cache blocks and a 8-way associative design. The cache has :
Cache size = 1024 bytes, sets t = 26.8, tag bits, s = 3.2, set index bit =2
Answer:
Check below for explanations
Explanation:
Cache size = 4096 bytes = 2¹² bytes
Memory address bit = 32
Block size = 8 bytes = 2³ bytes
Cache line = (cache size)/(Block size)
Cache line = 
Cache line = 2⁹
Block offset = 3 (From 2³)
Tag = (Memory address bit - block offset - Cache line bit)
Tag = (32 - 3 - 9)
Tag = 20
Total number of sets = 2⁹ = 512
Answer
Digital Millennium Act
Explanation
The Digital Millennium Copyright Act is a United States copyright law that implements two treaties of the World Intellectual Property Organization . The aim of this ACT is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization Copyright. The law has two basic functions. First, it protects copyright owners by providing them with a mechanism to enforce their rights without having to directly sue the infringer
Answer:
F
Explanation:
It depends on whether the person has interest in it
Answer:
<u>720</u> possible PIN can be generated.
Explanation:
To calculate different number of orders of digits to create password and PIN, we calculate permutation.
Permutation is a term that means the number of methods or ways in which different numbers, alphabets, characters and objects can arranged or organized. To calculate the permutation following formula will be used:
nPr = n!/(n-r)!
there P is permutation, n is number of digits that need to be organize, r is the size of subset (Number of digits a password contains)
So in question we need to calculate
P=?
where
n= 10 (0-9 means total 10 digits)
r= 3 (PIN Consist of three digits)
So by using formula
10P3 = 10!/(10-3)!
=10!/7!
= 10x9x8x7!/7!
= 10x9x8
= 720