Answer:
The answer is "who, what, when, and how"
Explanation:
In the software engineering process, it includes software development, management activities such as the enforcement, analysis, layout, scripting, reviewing, and maintenance of requirements. These Methodologies were used to create applications that are only different ways to develop and differential equations.
Answer:
"The type of the software which a user wants to use" is a consideration point for the amount of ram while purchasing the computer system.
Explanation:
- The Ram is primary memory, which is used when the system is in on mode. When there is less amount of Ram, then the user of the computers can not able to run multiple programs or runs that type of program which consumes more memory.
- And if there is a high amount of RAM memory, then the user can run multiple programs at the same time or can run that program which takes more memory.
- So when any user wants to decide about the Ram, then he can by deciding the type of software, which he wants to use. How much that software can use the memory.
Answer:
On-line css
Explanation:
Web design is the development of web pages using web development tools like HTML ( hypertext mark-up language), CSS and JavaScript. HTML is not the main code itself, because it only uses it's tags of elements to mark layout of the page. External and in-line css are used differently. In-line css is used directly on the HTML elements in the HTML file to style the element property, but external CSS is a CSS file that addresses a html element file.
Answer:
Explained
Explanation:
Fixed length instruction:
Advantage Of fixed length instruction that it is fast and results in better performance when level piping is used.
Disadvantage is that it wastes space.
Variable length instruction
Advantage is that it saves storage space.
Disadvantage is that it is complex to decode.
Currently variable length is more commonly used.
Answer:
Banner Grabbing
Explanation:
Banner grabbing is a reconnaissance technique to retrieve information about a computer or about a network and its services. This is used by administrators to take inventory of systems and services on their network.
Banner grabbing is used to gain information about a remote server and is intruders sometimes use this technique to retrieve information about remote servers. divulge software version numbers and other system information on network hosts. This is a technique of getting software banner information. This information may include operating system information, version and certain services and this helps hackers to attack the network. Banner grabbing can disclose vulnerable applications which can result in service misuse and exploitation.
Banner grabbing is done manually or automatically by using tools. Tools commonly used to perform banner grabbing are Telnet, Wget, nmap, zmap and Netcat etc.