Answer:
   B.  The remainder when dividing a whole number by 2
Explanation:
A binary digit can have the values 0 or 1. The remainder from division of an integer by 2 will be 0 or 1. Hence that remainder can be represented by a single binary digit.
__
That fact can be used to do conversion of a number to binary.
 
        
             
        
        
        
Answer:a) Mainframes, miniframes, PCs, desktop Internet computing, mobile computing
Explanation: The hierarchy of the computers or computing are in the generation is:-
- Mainframe:-designed for the execution of huge data processing , storage and execution.
- Miniframe:-has similar functioning as the mainframe but on smaller scale and version.
- Personal computer(PC):-It is designed for the individual purpose and according the need of the user.
- Mobile computing:-computing that can be done on the mobile phone similar to the computing on the personal computer
- Internet computing:-the computing of the mobile and computer system with the facility of the internet connectivity.
 
        
             
        
        
        
Answer: Doxing
Explanation: Doxing which is also referred as doxxing is defined as the revealing or publishing of the private records or information to the public.It is considered as the illegal practice which is base on the the internet service.The publicizing of the private data or confidential information is punishable offence.
Other options are incorrect because filtering is the elimination of the not required content, spamming is the activity of sending undesired bulk messages and hacking is the attacking of the system using false means to corrupt and steal data.Thus the correct option is doxing. 
 
        
             
        
        
        
Answer:
you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.
Explanation:
Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.
One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept. 
Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere. 
 
        
             
        
        
        
You can go to their house and talk to them