There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
Answer:
La cilindrada total del motor es de 1997,025 centímetros cúbicos.
Explanation:
Para determinar la cilindrada total Vt en un motor de 4 cilindros de 83,6 mm de diámetro por 91 mm de carrera se debe realizar el siguiente cálculo, sabiendo que para calcular la cilindrada de un motor se debe utilizar la fórmula ((Pi x Diámetro^2)/4) x Carrera x Número de cilindros = X:
((3.14 x 83.6^2)/4) x 91 x 4 = X
((3.14 x 6,988.96)/4) x 364 = X
(21,945.3344 / 4) x 364 = X
5,486.3336 x 364 = X
1,997,025.4304 = X
1 milímetro cúbico = 0.001 centímetro cúbico
1,997,025.4304 milímetros cúbicos = 1997.0254304000005 centímetros cúbicos
Por lo tanto, la cilindrada total del motor es de 1997,025 centímetros cúbicos.
Answer:
#include <stdio.h>
void printValues ( unsigned char *ptr, int count) // count is no of cells
{
for(int i=0; i<count; i++) {
printf("%d ", ptr[i]);
}
}
int main ( )
{
unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;
printValues( data, sizeof(data)/sizeof(data[0]) );
}
Explanation:
Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.
Answer:
Hot site.
Explanation:
It seems to be a specific and completely designed functionality inside the sites which assist disaster recovery, in which the organization may travel directly during a disaster as well as continue operations.
- It may be described as such a recovery site that is repeatedly fully operational.
- It enables the corporation to resume normal corporate processes during a disaster, within such a limited period cycle.
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
Advantages:
It is easy to handle and implement.
It is best suited for small networks.
Disadvantages:
The cable length is limited. This limits the number of stations that can be connected.
This network topology can perform well only for a limited number of nodes.