Answer:
B. How many programming statements the program contains
Explanation:
If a program is intended to be able to process large amounts of data, then the ability of the program to process larger data sets is heavily affected by
- execution time
- size of memory the program requires
- storage space the program requires as it runs.
The length of the statements the program contains does not much affect program performance.
Answer:
mouse, track ball, stick, touch pad, tablet
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Answer:
Explanation:
The following code is written in Python. It creates a variable that detects the current time. Then it loops through a range of numbers and chooses the last random number after 2 seconds. Finally, it prints that number to the screen. This function can be called countless times depending on the number of state lottery numbers needed.
import random
import time
start_time = time.time()
while time.time() - start_time < 2:
lottery_number = random.randint(0, 48)
print(lottery_number)
Answer: C
Explanation:
That way she can have slides for her advance class and leave out slides that her normal class doesn’t need