Answer:
See explaination
Explanation:
CREATE TABLE CATEGORY
(
cid int NOT NULL,
description varchar2(1000),
PRIMARY KEY (cid)
);
CREATE TABLE PRODUCT
(
pid int NOT NULL,
description varchar2(1000),
cid int,
price int,
p_size varchar2(1),
CONSTRAINT chk_price CHECK (price>0),
CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),
CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)
);
Answer:
<u>IRET(Interrupt return) </u>
This instruction is used in x-86 intel cpu architecture.
The IRET instruction provides for a long return to the program or procedure interrupted. IRET and IRETD these two instructions have the same meaning.
Each interrupt procedure has an IRET instruction stating that the routine ends. The execution of the instruction pops up the IP address from the stack and continues to run the primary program.
Answer:
10
Explanation:
To convert decimal to binary, you just count like normal, but instead of regrouping when adding 1 when you reach 9, you regroup when you reach 1.
in this case, you would count like this:
0
1
10
Answer:
Using a one time password OTP and using a three factor authentication.
Explanation:
Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.
Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.
One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.