Answers
- OS(The Operating System) sends <em>interrupts to the processor</em> to stop whatever is being processing at that moment and computer architecture send <em>data bus</em>. This bus sends<u> data between the processor,the memory and the input/output unit.</u>
- The operating system is a low-level software that supports a <em>computer’s basic functions</em>, such as <u>scheduling tasks and controlling peripherals</u> while the computer architecture has the <em>address bus bar</em>. This bus carries <u>signals related to addresses between the processor and the memory.
</u>
- The interface between <em>a computer’s hardware and its software</em> is its Architecture while An operating system (OS) is<u> system software that manages computer hardware and software resources and provides common services for computer programs.</u>
Explanation:
In short explanation,the Computer Architecture specifically <em>deals with whatever that's going on in the hardware part of the computer system </em>while the Operating System is the computer program <em>which has been program to execute at some instances depending on the programming instructions embedded in it</em>. An example is the MS Office.
The __Show/Hide Insert___ feature will allow users to view non printing formatting marks to aid in editing a document.
The answer is D. Show/Hide Insert
Let me know if this is correct
Answer: rootkit
Explanation:
Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.
Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.
If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, the first statement will be used.
a. First
<u>Explanation:</u>
We use ACL technology to make basic security level in the network. ACL is strictly used to update the routing in the network and make sure network pears and make sure the flow control for network traffic is followed.
Since it is routing ip address through ACL statement. It all depends on how the network engineer routed the traffic in the network. A packet with source IP address 1.1.1.1 would match any of the three explicitly configured commands described in the question. As a result, the first statement will be used.
The router searches the ACL statement by order and when the match is found it stops execution of the ACL statement that will match with the first occurrence.