Answer:
is this overdue
Explanation:
it probly is you are smart you can do this
<span>The five steps in the fetch/execute cycle are :
1) Instruction Fetch (IF) - This starts with the moving from the memory to
the control unit which is given by the program counter. T</span><span>he control unit
can then access the data immediately from the memory.</span><span>
2) Instruction Decode (ID) - what task the system has to do, where the
results is to be stored and what operation is to be performed by which
data.
3) Data Fetch (DF) - it gets the value from the memory.
4) Instruction Execute (IE) - The particular instruction is executed.
5) Result Return (RR) - The Result Value is restored in a
particular memory location. T</span><span>he return of new data resulting from
(EX) that is put back into memory.</span>
Answer:
(d) 6
Explanation:
When we call factorial(3) first it will check if it greater than 1 since it is greater then return 3*factorial(2) will be called on factorial(2) it will again check that 2>1 since it is greater then return 2*factorial(1) will be called.In factorial(1) we have is not greater than 1 so it will return 1.return 2*factorial(1) will return 2 and 2 that is returned by factorial(2) will be multiplied with 3.So it will return 6.
Answer:
Intrusion detection system
Explanation:
An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.