Answer:
you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.
Explanation:
Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.
One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.
Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.
Answer:
The program to this question can be given as follows:
Program:
public class data //defining class data
{
//main method
public static void main (String [] as) //declaring main method
{
int userNum = 4; //declare variable userNum and assign value
for (userNum = 1; userNum <= 4; userNum++) //loop for print values
{
System.out.println(userNum); //print values in new lines.
}
}
}
Output:
1
2
3
4
Explanation:
In the above java program code firstly a class "data" is defined, inside this class the main method is defined in which an integer variable userNum is defined that holds a value that is "4".
- In this method, a for loop is declare that uses variable userNum which starts from 1 and ends with a given value that is equal to 4.
- Inside a for loop, the print function is used that print userNum variable each values in the newline.
Question: what does the system software do
Answer: this is used to run a computer's hardware and application programs.
Explanation: this is used to maintain downloads and other things and keep your computer up to date
question answered by
(jacemorris04)
40. External Peripherals of a Computer systems are the following:
-> Keyboard – this is an input device
-> Mouse – This is an input device also
-> Printer – this is an output device
-> Flashdrive – This is a storage device
-> Monitor – this is an output device
-> external hard drive – this is a storage device
Output device are those devices that communicate the results of the data processing to the user
Input device are those device that communicate the results of the data processing to the computer system
Storage device are those device that stores data.
Answer:
continual user involvement gives the flexibility to analyze the requirements in right direction. because there is continuous meetings with the end user and he can provide right direction or avoids wrong interpretation of the requirement
Explanation:
continual user involvement is useful when we are following agile methodology where we are building complex systems. it is not useful for simple sytems and following waterfall methodology