Answer:
d) All of the above
Explanation:
In configuration management, the Identify configuration items, work products and related components are present.
- All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
- The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
- Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
Answer:
RUP
Explanation:
RUP or Rational Unified Process is an IBM's software that divides the development process in four phases. It was developed to work throughout the entire software development life cycle, it's adaptive.
I hope you find this information useful and interesting! Good luck!
Answer:
A. Define boundaries
C. Deny access
D. Delay access
Explanation:
A barrier is a material or structure used to prevent or block access. Barriers can either be natural or structural and are used for many purposes usually for security reasons. The following are functions of barriers either natural or structural:
- Define areas of boundaries
- Delay or slow access. Example is the use of speed bumps to slow down vehicles.
- Provide access to entrances such as the use of gates
- Deny access to unauthorized personnel and allowing authorized personnel.
Answer:
From DRAM to DDR4
Explanation:
RAM stands for <em>Random Access Memory.</em> In 1968, Mr. Robert Dennard at IBM's Watson Research obtained the patent for the one-transistor cell that will eventually substitute the old magnetic core memory allocated in computers of the time. By 1969 Intel released the TTL bipolar 64-bit SRAM (Static Random-Access Memory) as well as the ROM "Read Only Memory"; also in 1969 it evolved into "<em>Phase - change memory - PRAM - </em>". However this evolution was not commercialized, Samsung expressed its interest in developing it. In 1970 the first DRAM product was commercially available; it was developed by Intel. In 1971 it was patented EPROM; in 1978 George Perlegos developed EEPROM.
By 1983 a nice breakthrough happened with the invention of SIMM by Wang Labs. In 1993 Samsung came up with KM48SL2000 synchronous DRAM (SDRAM), this variation soon turned into an inductry standard.
In 1996 DDR began a revolution in the memory sector, then in 1999 RDRAM. Both DDR2 SDRAM. DDRR3 and XDR DRAM were commercialized. Finally in 2007 and 2014 the developments of DDR3 and DDR4 were available for the general public.
The protocol that should be used for establishing a secure network connection is SSH.
The following information is to be considered:
- SFTP is secure also it is a protocol for file transferring that applied SSH.
- IP, FTP, and DHCP should not be for safety purposes as they are not secure.
- SSH is a secured connection for the remote sites so here the SSH protocol should be used.
Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.