<span>B.network security means all personal information is kept safe the network is not compromised and only authorized users had access
Im pretty sure they ment has instead of had</span><span />
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The for-loop given in the question is:
for ( j = 0; j < 10; j++ )
{
appendItem (myList, aNumber); //this loop append a number to a list myList
}
This loop starts from J variable's value zero and when J's value is less than 10, the loop iterate through its body until J's value becomes greater or equal to 10. As J's value exceed nine, the loop will get terminated.
So this loop repeats 10 times its loop body, at the 11th time, the condition becomes false and the loop will get terminated.
Answer:
It is just true in most cases
Explanation:
This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.
Having a physical access is one step closer in some cases but not the only step required .
Answer: Identifying sequences
Explanation:
Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.
In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.
Therefore, the best option is B.
Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.
RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of control unit,micro program control memory, cache, instruction and data path and main memory.
The differences between RISC and CISC are as follows:-
- The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
- The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
- The execution of RISC is faster as compared to CISC.
- RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .