Answer:
IxxyzjgzkgzjgKfzkg v
jvljcljxkhxkgg/gjhkggzkykzkgjzjgggggzjgcufxu
Explanation:
nk yxthzefhGghghrhgzxhhsdgchiixxu
Answer:
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Explanation:
i feel that i remmeber it from a test
Answer:
// This program is written in C++ programming language
// Comments are used for explanatory purpose
// Program starts here
#include <iostream>
#include <string>
using namespace std;
// Declare variables
int inputvar;
// Declare output variable as array
int outputvar[32];
// Set a counter for binary array
int i = 0;
while (inputvar > 0) {
// Divide inputvar by 2 and store remainder in outputvar
outputvar[i] = n % 2;
inputvar/=2;
i++; // increment i by 1
}
// End of division
// Prin resulting array in reverse order
for (int j = i - 1; j >= 0; j--) {
cout << outputvar[j];
}
return 0;
}
// End of Program
I will assume this is a windows computer
Answer:
- Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
- You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.
Explanation:
The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.
Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.
Answer:
- Because the page is not in its page table
- The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table
Explanation:
On a system with paging, a process cannot access memory that it does not own because the page is not in its page table also the operating system controls the contents of the table,therefore it limits a process of accessing to only the physical pages allocated to the process.
The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table.that way two processes that needs to exchange data can efficiently do that . i.e creating a very efficient inter-process communication