Answer: Source
Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.
The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .
The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.
The best way of doing this would be when you are opening a document application, the first thing that you would do in this case in to click "new". And by clicking new, you would have a fresh new spread sheet.
Answer:
Redundant paths can be available without causing logical Layer 2 loops.
Explanation:
- Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
- These loops are called physical loops.
- When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
- This affects the performance of the network as the result of broadcast packets flooding.
- STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
- Spanning Tree Algorithm is used by STP to determine the optimal path of switch to the network.
- Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
- This information helps STP to eliminate the redundant paths.
- So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
Answer:
Software requirement specification
Explanation:
requirement specification is the first step before proceeding with any project.
we should validate our output at all phases with software requirement specification
Answer:
The correct answer to the following question will be "Local mapping".
Explanation:
- A data independence standard in global DBMSs where questions can be constructed without understanding the local formats. Knowledge of quotas of pieces and components is however important.
- With the transparency of local mapping, the user wants to determine both fragment location and name of data items, keeping in mind any replication that may occur.
- This is clearly a more complicated and time-consuming question for all the users to answer than the first. A program that only offers it the amount of transparency would be unlikely to be satisfactory to later part-users.
Therefore, "Local mapping" is the right answer.