ohhhhh okkkkkkkk??!! haha
Answer:
MIPS Code:
.data
newline: .asciiz "\n" #newline variable
.text
MAINLOOP:
li $v0, 5 #syscall to get user interger and store in $v0
syscall
add $a0, $zero, $v0 #moving the user input to $a0 from $v0
beq $a0, 0, EXIT #branching to EXIT when $a0 is 0
li $v0, 1 #syscall to print integer in $a0
syscall
li $v0, 4 #syscall to print newline
la $a0, newline
syscall
j MAINLOOP #jumping to MAINLOOP
EXIT:
Sample Output:
6
6
7
7
3
3
0
Answer:
table of contents/ straight line/horizontal line/diagonal line/zigzag line/curved line(softly) curved line(fully) thin line
Explanation:
your welcome
Answer:
monitor fileSharer
{
enum {THINKING, WAITING, READING} state[N];
condition self[N];
int total;
void open(int i) {
state[i] = WAITING;
if (i + total >= N)
{ self[i].wait(); } // Leaves monitor
state[i] = READING;
total += i;
}
void close(int i) {
state[i] = THINKING;
total -= i;
// Can signal one waiting proc whose ID won't break bank.
for (int x = N - total - 1; x >= 0; x--) {
if (state[x] == WAITING) {
self[x].signal(); break;
}
}
}
initialization.code() {
for (int i = 0; i < N; i++) {
state[i] = THINKING;
}
total = 0;
}
}
Answer:
Types of cybercrime
Here are some specific examples of the different types of cybercrime:
*Email and internet fraud.
*Identity fraud (where personal information is stolen and used).
*Theft of financial or card payment data.
*Theft and sale of corporate data.
*Cyberextortion (demanding money to prevent a threatened attack).
*Ransomware attacks (a type of cyberextortion).
*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
*Cyberespionage (where hackers access government or company data).
Most cybercrime falls under two main categories:
*Criminal activity that targets
*Criminal activity that uses computers to commit other crimes.
Explanation: