Answer:
Replay
Explanation:
A replay attack is an attack on network in which there is malicious or fraudulent repetition or delay in transmitting valid data. This is done by an originator who initially obstructs data before re-transmitting it.
Replay attack helps hackers to have access to information stored and protected on a network.
Hackers uses replay attack to duplicate transaction and withdraw money from people's account.
Replay attack is also known as playback attack, it is a cyber attack.
Answer:
True
Explanation:
Embedded operating systems are operating systems which supports hardware which is not a computer and allows the hardware to perform its task.
An example of a device with an embedded operating system is an SD card. The operating system on the card allows the card to be readable by the computer which its is plugged to.
Other examples of hardware with embedded systems are traffic lights, digital televisions, ATMs, point of sale (POS) and digital cameras.
Answer:
The program in Python is as follows:
word = input("Word: ")
if len(word) < 5:
print("At least 5 characters")
else:
pal = word[0:5]
word = word[0:4]
word = word[::-1]
pal+=word
print(pal)
Explanation:
This gets the word from the user
word = input("Word: ")
This checks if the length of the word is less than 5.
if len(word) < 5:
If yes, this tells the user that at least 5 characters is needed
print("At least 5 characters")
If otherwise
else:
This extracts the first 5 characters of the word into variable named pal
pal = word[0:5]
This extracts the first 5 characters of the word into variable named word
word = word[0:4]
This reverses variable word
word = word[::-1]
This concatenates pal and word
pal+=word
This prints the generated palindrome
print(pal)
Answer:
The answer is "Option b".
Explanation:
A data backup is a mechanism of generating a duplicate copy from your sensitive files and data like your photos, video clips, documents, and links, for example — so your data is safe and accessible when something occurs to your device, it would be the first to the provider of tough-to-replace data, and it is essential, but its recovery method must be safe, and other choices were wrong that can be described as follows:
- In option a, It does not require always, that's why it is wrong.
- In option c, It is wrong because data backup is necessary.
- In option d, It doesn't provide detrimental security, that's why it is wrong.