Answer:
Peg
Explanation:
This is known as the "peg technique." The name comes from the fact that we usually employ pegs to hang clothes to dry. In this memory aid, the person who wants to memorize something creates mental associations between two concrete objects. This is done in a one-to-one fashion that links all the words together.
<h2>password method</h2>
Explanation:
Rootkit virus is one type of virus which is hidden about its existence and tries to affect the maximum number of system.
Password method: This is a graphical method to identify the text hidden in the signature and confirming that it is not a robot or any other system to protect the system from hacking. This would be really hard-to-read and thus ensures safety.
Antivirus software: This is a system to protect the system, when the virus tries to attack the system. An indication will be given through the software to the user.
Answer:
The answer to this question can be described as follows:
a) True
b) False
c) False
d) False
e) False
f) True
Explanation:
In option a, PATA device is used to connect the hard drives into systems. Its title suggests, depends on parallel transmitting technology, contrasted to the compulsive-signaling tools.
In option b, SATA1 is a first-generation device, and SATA3 third generation, that's why it is wrong.
In option c and option d, both were wrong because RAID 0 and RAID 5 are Cloud computing software for storing data.
In option e, An internal SATA data cable with an eSATA port can not be used as an additional connection is provided by the eSATA port.
In option f, It is true because there are 7 pins in internal SATA.