Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
Answer:
Check the explanation
Explanation:
1.
System = 256Byte = 8 bit
Cache = 64B , block size = 16 byte.
A) Direct Mapped Cache:
Block offset = log (Block size) = log 16 = 4bit
Total # of block inside cache = 4.
Therefore index offset = log 4 = 2bit.
Remaining is tag bits.
Therefore tag bits = 8-(4+2) = 8-6 = 2 bits
Tag Index offset Block offset
(2 bits) (2 bits) (4 bits)
Fully associative cache :
In fully associative cache, any of main memory block can be placed anywhere in cache. Therefore index offset =0 bits.
Therefore tag bits = 8-block offset bit= 8-4 =4bits
Tag Block offset
(4 bits) (4 bits)
Answer:
The correct answer to the following question will be "Access".
Explanation:
- Registered users have legal access to a network, while hackers may access a system illegally. The capacity is controlled by access controls. Access is defined as the right of a subject or object to use, manipulate, modify, or influence another subject or object.
- Access control was the selective limitation of access to a location or other property while the mechanism is represented by access management. Access act may mean use, entry, or use. Permission is called authorization to access a resource.
Therefore, Access is the right answer.