Answer:
Name of Operating System: Ubuntu
Five legal file names:
inventory.txt
total.txt
NIKKAH.txt
Defaulter.txt
studenT.txt
Five illegal file names:
wel/come.txt
..
MY>note.txt
.
my<work.yxt
Explanation:
To fix the illegal name:
1. Remove the special character, so it becomes welcome.txt
2. Remove the double dot and rename using text characters
3. Remove the special character, so it becomes MYnote.txt
4. A file cannot be named using dot. So we rename to a textual name
5. Remove the special character, so it becomes mywork.txt
Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.
The main advantage is the security, the pan is a personal network of one or two person so there is no risk of any leak of data, best way to share resources each other via bluetooth
The distinction between "computer architecture" and "computer organization" has become very fuzzy, if no completely confused or unusable. Computer architecture was essentially a contract with software stating unambiguously what the hardware does. The architecture was essentially a set of statements of the form "If you execute this instruction (or get an interrupt, etc.), then that is what happens. Computer organization, then, was a usually high-level description of the logic, memory, etc, used to implement that contract: These registers, those data paths, this connection to memory, etc.
Programs written to run on a particular computer architecture should always run correctly on that architecture no matter what computer organization (implementation) is used.
For example, both Intel and AMD processors have the same X86 architecture, but how the two companies implement that architecture (their computer organizations) is usually very different. The same programs run correctly on both, because the architecture is the same, but they may run at different speeds, because the organizations are different. Likewise, the many companies implementing MIPS, or ARM, or other processors are providing the same architecture - the same programs run correctly on all of them - but have very different high - level organizations inside them.
The correct answer or solution to the question above is marked A
Answer:
Inter switch link
Explanation:
It is the inter switch link( ISL) that enables to carry the traffic for all local VLANs. Functions of VLANs are firstly, a VLAN allows us to take one physical switch, and break it up into smaller mini-switches. Secondly, every virtual switch, called VLAN, is simply a number assigned to each switch port.