Answer:
- Because even though your implementation may not change, new vulnerabilities in frameworks and libraries may be found that affect your security.
- If your implementation does change, there could be unwanted side effects on security.
- Operating system updates that happen behind your back could introduce new vulnerabilities.
Answer:
5.23 LAB: Adjust values in a list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.
Explanation:
Answer:
Following are the program in c language
#include<stdio.h> // header file
int main() // main function
{
int ar[10],k,biggest; // variable declaration
printf("Enter the ten values:\n");
for (k = 0;k < 10; k++)
{
scanf("%d", &ar[k]); // user input of 10 number
}
biggest = ar[0]; // store the array index of 0 into biggest variable
for (k = 0; k< 10; k++) // finding the biggest number
{
if (ar[k] >biggest)
{
biggest = ar[k];
}
}
printf(" biggest num is %d", biggest); // display the biggest number
return 0;
}
Output:
Enter the ten values:
12
2
4
5
123
45
67
453
89
789
biggest num is 789
Explanation:
Here we declared an array ar[10] of type int which store the 10 integer values.
Taking 10 integer input from the user in array ar .After that iterating the loop and finding the biggest number by using if statement and store the biggest number in biggest variable .
Finally display biggest number.
Answer: data loss protection
Explanation:
In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.
It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.
So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.
Answer:
Quality of service (QOS).
Explanation:
In recent computer networking, the convergence of voice, video and text data packet has been made possible. There is no need for a dedicated network for a particular type of packet.
QOS or quality of set is a service rendered to voice or audio packets in VoIP phones to enhance communication.
The email is a digital mailing system that can be used to send all three packets. It enjoys the QOS as voice packets. It is given high preference for transmission and uses the TCP protocol to transmit data reliably.