Answer:
Caesar cipher
Explanation:
In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.
There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.
Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.
Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.
Answer:
Swap daemon
Explanation:
Swap daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is needed. The main function of the swap daemon is to monitor processes running on a computer to determine whether or not it requires to be swapped.
The physical memory of a computer system is known as random access memory (RAM).
A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer.Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS),machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).
Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.
There are two (2) main types of random access memory (RAM) and these are;
1. Static Random Access Memory (SRAM).
2. Dynamic Random Access Memory (DRAM).
Answer:
chemlab1.doc stored in biology folder which stored in folder studies which stored in mydocs folder which is in C local disk
Explanation:
Answer:
Be respectful – and expect respect.
Protect your reputation.
Protect your privacy.
Watch your tone.
Be sceptical.