Answer:
Process re-design is the process in which re-work is done to achieve the improvement in the output. The major aim is to set the goals for achieving the main objective.
The various essential steps in the process of re-design are:
- Data capturing process are used to identify the process and making the necessary changes.
- Identify every step of the process to ensure that process is in organized way along with the workflow.
Re-engineering is the process of re-design the system with focuses to improve the efficiency and quality. It basically analysis the whole business re-engineering process. The main step is to identify the need for the changes.
Answer:
double the bandwidth assigned per channel to 40 MHz
Explanation:
The best way of doing this would be to double the bandwidth assigned per channel to 40 MHz. This will make sure that the capacity is more than sufficient. This is simply because the bandwidth of a channel represents how much information can pass through the channel at any given second, the larger the channel, the more information/data that can pass at the same time. Therefore, if 20 MHz is enough for the network, then doubling this bandwidth channel size would be more than sufficient capacity for the network to handle all of the data.
Answer:
use of vacume tubes to make circuit
use of punch cards as I/O devices
use of high electricity
use of magnetic drums
use of machine language and symbols in instuctons
In the document...? Not sure what the question is.
Answer: Rootkit
Explanation: Rootkit is the software that helps in carrying out malicious attack by giving the permission to unauthorized user for accessing the system. This software comes with numerous tools for attacking the restricted and confidential information and resources of the system such as password stealers, key-loggers , antivirus disabling tool etc.
Network defender can lose trust when rootkit software gets into the operating system because it gives complete control for privileged accessing the system to the attacker .The detection and elimination of rootkit is also a difficult task.
Other options are incorrect because worm is malware that copies and spreads from one computer system to other. Trojan provides the unauthorized access of attacker in the system and can infect system but cannot be highly harmful as rootkit. Exploit is a code that enters the system to provide access to cyber-criminals but it can be detected .
Thus ,the correct option is rootkit.