Answer:
Ransomware
Explanation:
Just as its name implies, you have to pay a 'ransom' to get a locked file that belongs to you
Answer:
Check the explanation
Explanation:
(a) There will be a need for the database to support a comparatively complex and complicated hierarchical internal record structure that may vary for each record. Column store NoSQL DBMS
(b)The key requirements for the database are to access a specific record structure as quickly as possible without any concern regarding the internal structure of the record. Key value store NoSQL DBMS
(c) The data are specifically well suited to be organized as a network of connections amid the data items. Graph Base NoSQL DBMS
(d) It is essential that the DBMS offers quick access to each of the records by a key value, but, in addition, it has to also allow easy access to the components of each record. Document store NoSQL DBMS
Answer:
The answer is "2".
Explanation:
In the given question some information is missing, that is "The propagation time for satellite to earth" which is "270 milliseconds" so, the description to this question can be defined as follows:
Given values:
Bandwidth = 64 kbps
Data frames = 512 bytes
Propagation Time (tp ) =270 ms
Change Bandwidth kbps to bps:
1 kb= 1024 bytes
calculated bandwidth= 64 kbps = 64×1024 bps = 65536 bps
1 bytes = 8 bits
512 bytes = 512 × 8 = 4096 bits
Frame length = 4096 bits
Formula
Transmission time (Tt) = Frame length /Bandwidth
Window size = 1+2a
where a = Propagation time/Transmission time
Calculate Transmission time:
Transmission time (Tt) = 4096 / 65536
Transmission time (Tt)= 625 m.sec
Calculate Window size:
Window size = 1+2(270/625)
Window size
= 1+2(0.432)
Window size
= 1+0.864
Window size = 1.864
Window size
= 2
Answer:Protects the local network from outside access
Explanation:Proxy is a type of serves as the mediator in computer network for connecting the network with the user system. These servers are responsible for maintaining the security against any unauthorized access in the system or internet,privacy and other functions.. It helps in protecting the whole network connection by taking the control at the servers .