Answer:
1BD.C
Explanation:
Keep in mind that octal number has 3 binary fields where the right field is the number 1, the center field is the number 2 and the left field is the number 4. you need that your 3 fields sum the final octal digit.
For example :
- (1)8 = (001)2
- (2)8 = (010)2
- (3)8 = (011)2
The hexadecimal number has 4 binary fields where the right field is the number 1, the center field is the number 2 , the next center field is the number 4 and the left field is the number 8. you need that your 4 fields sum the final hexadecimal digit.
For example:
- (F)16 = (1111)2
- (1)16 = (0001)2
- (6)16 = (0110)2
Step 1: Split your octal number in digits and convert to binary form
6 7 5 . 6
110 111 101 . 110
Step 2: Join your binary number and split in groups of 4 elements from the point (Important note: If you miss some element to complete the groups at the left of the point complete with zero's at the left, else if you miss some element to complete the groups at the right of the point complete with zero's at the right)
binary complete: 110111101.110
binary in groups of 4:
1 1011 1101 . 110
Complete the groups with zero's (Remember the important note):
0001 1011 1101 . 1100
Step 3: Calculate the hexadecimal number
1 B D . C
Answer:
the information processing cycle
Explanation:
Answer:
Phishing
Explanation:
Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.
The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c
Answer:
The answer to the given question is the option "a".
Explanation:
In this question, the answer is "middleware" software because this software works between the operating system and the applications that provide connectivity to two or more software applications. for example database, application server, etc and other choices that are not correct can be described as:
- In option b, The integration middle wear represents the software of the system. It does not coordinate between operating and application software.
- In option c, It is used to manage the data and the information for the process.
- In option d, It includes the hardware, software and the networks. In this hardware and software link for use software.
That's why the answer to this question is the option "a".