Learning
planning
designing
developing
testing delivering
Explanation:
License boot module c2900, technology-package uck9
<u>Explanation:</u>
a.
- One user can read the private data of another user-privacy.
- One user can prevent another user from getting anything done-denial of service.
Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.
b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.
Answer:
In today's world, everyone using smartphones as it easily allow to communicate by using different types of features like texting, video, e-mail and by using internet we can run various types of applications.
Smartphones carries one of the main and important skills that is show our current location. By using various types of applications like Global positioning system (GPS), cell ID and wifi we can easily trace the location.
But there is different types of option according to the individual requirement as some people want privacy as they are not interested to share their location to anyone.