Answer:
Option 2: Sloper is a basic pattern in a garment.
Explanation:
Sloper is a building block of each patterns like stem cell is the beginning of everything. It is basically a generic pattern based on all the measurements we have.
Now we speaking in terms of computer language, can relate sloper with a function, which is a part of a program. We can alter a function to achieve desired and required results. Similarly, a sloper is a main part of the garment containing information about how to alter the garment to fit you perfectly.
So, without sloper we have nothing to design and having sloper means we have everything.
Answer:
A) 2.56 ms
B) 128 μs
Explanation:
Time for Bus cycles = 500 ns
Transfer of bus control = 250 ns
I/0 device data transfer rate = 50 KB/s
Data are transferred at : 1 byte at a time
A) Determine how long the device tie up the bus when transferring a block of 128 bytes
Block size to be transferred = 128 bytes
Bandwidth = 50 KB/s
data transfer = (Block size ) / ( Bandwidth)
= ( 128 * 8 ) / ( 50 * 10^3 * 8 )
= ( 1024 ) / ( 50 * 10^3 * 8 )
= 2.56 ms
To determine the actual transfer time we have to add up the transfer time for the bus control in both directions :
2.56 ms + 500 ns = 2.56 ms. this is because 500 ns is not a significant value
B) cycle stealing mode
In this mode each byte is transferred at a time and The total transfer time needed for the bus control in both directions will be double the total time i.e 2 * 500 ns = 1000 ns. because additional control time of 250 ns is required at both ends
since 1 byte is transferred at a time , 1 byte will be transferred in 1 μs
128 bytes = 128 * 1 μs = 128 μs
The first example is an IPv4 address. Because IPv4 is only 32 bits long there are only about 4 billion addresses available. To expand the address space IPv6 came into existence and your second example is an IPv6 address.
Its either called an HDD or an SSD
Answer:
BlueBorne Attack
Explanation:
If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.
Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication
Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.