The three most common operating systems for personal computers are Microsoft Windows, Apple Mac OS X, and Linux.
<u>Explanation:</u>
<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.
a. Cindy may learn the difference between these two techniques used to create a malware attack:
- through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
- through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.
b. Here are some common suggestions;
- Never open attachments from strange email addresses.
- install a paid antivirus software.
- be mindful of websites with too many ads.
Answer:
2^7= 128
Explanation:
An instruction format characterizes the diverse part of a guidance. The fundamental segments of an instruction are opcode and operands. Here are the various terms identified with guidance design: Instruction set size tells the absolute number of guidelines characterized in the processor. Opcode size is the quantity of bits involved by the opcode which is determined by taking log of guidance set size. Operand size is the quantity of bits involved by the operand. Guidance size is determined as total of bits involved by opcode and operands.