Answer:
The correct option is (d) Use a service account and prohibit users from accessing this account for development work
Explanation:
Solution
As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:
By making use of a service account and forbids users from having this account for development work.
The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.
Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.
Explanation:
A.)
we have two machines M1 and M2
cpi stands for clocks per instruction.
to get cpi for machine 1:
= we multiply frequencies with their corresponding M1 cycles and add everything up
50/100 x 1 = 0.5
20/100 x 2 = 0.4
30/100 x 3 = 0.9
CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8
We find CPI for machine 2
we use the same formula we used for 1 above
50/100 x 2 = 1
20/100 x 3 = 0.6
30/100 x 4 = 1.2
CPI for m2 = 1 + 0.6 + 1.2 = 2.8
B.)
CPU execution time for m1 and m2
this is calculated by using the formula;
I * CPI/clock cycle time
execution time for A:
= I * 1.8/60X10⁶
= I x 30 nsec
execution time b:
I x 2.8/80x10⁶
= I x 35 nsec
Answer:
(1) Protecting the privacy of personal data and proprietary information
(2) Proprietary Information
These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon
(1) Disaster Recovery Policy
(2) Acceptable Use Policy
(3) Business Continuity plan
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
Answer:
-
= 1
= 1
Explanation:
Argon atom has atomic number 18. Then, it has 18 protons and 18 electrons.
To determine the quantum numbers you must do the electron configuration.
Aufbau's principle is a mnemonic rule to remember the rank of the orbitals in increasing order of energy.
The rank of energy is:
1s < 2s < 2p < 3s < 3p < 4s < 3d < 4p < 5s < 4d < 5p < 6s < 4f < 5d < 6p < 7s < 5f < 6d < 7d
You must fill the orbitals in order until you have 18 electrons:
- 1s² 2s² 2p⁶ 3s² 3p⁶ : 2 + 2 + 6 + 2 + 6 = 18 electrons.
The last electron is in the 3p orbital.
The quantum numbers associated with the 3p orbitals are:
= 1 (orbitals s correspond to
= 0, orbitals p correspond to
= 1, orbitals d, correspond to
= 2 , and orbitals f correspond to
= 3)
can be -1, 0, or 1 (from -
to +
)
- the fourth quantum number, the spin can be +1/2 or -1/2
Thus, the six possibilities for the last six electrons are:
- (3, 1, -1 +1/2)
- (3, 1, -1, -1/2)
- (3, 1, 0, +1/2)
- (3, 1, 0, -1/2)
- (3, 1, 1, +1/2)
- (3, 1, 1, -1/2)
Hence, the correct choice is:
-
= 1
= 1