Answer:
kbfbnmcj hbx nmjn mz kjn mj hk hhhhhhgdhggbddddddbvgfcgfctrctgvhyubujbnjinkikmokimloplkmkojihgftrdesw3l,kmjinhuygtfrde4sw34drftyghuijokkkkkkkkkkkkkkkijjjjjjjkopl[[[[[koiju98hytttttttttttttuhiouhygdtrsgyuihkl;;ihugydtrcfbhjklioutrcgfbhjkloiuytdrhjukliuytrdgfhjkiouy7gfhjklpoiudtrkhjl;[poiughjbnm,;lkihuygtfvbnmjkiuytfgchvbnmkjlhuygfdc vbnhnjkygtdsfxghbjkiuhytrdgfhjuioytrdfgchbnmkloiuytfdfghjiouyyyyyyhjkpoi8u97t6rdghjuo0987hjklpo0i98uyghjbkopiuyhjbnkploiuhyjbnmkloiuhygbvjnmk,l;oipuhgbjkn mjhuygfvbnhjkiouuuukjopipkjmloiujoklm;okjm,kloiuhjnmkiuhjbkiuygfhuji8yghyugfvhjkjiuhygfhuijokpiuyt67u89poiuhygftduhjklphuytfrdesdtgyuhi;lkyuuuugij'[;;;;;;;;;;;;;;;;;;;;okpuuuutyyyyy[poiudtryuiop[;oiudtrruiooooooooytg[pl;oiuhygtfffkjjjjhugvcfxkml,;kjnhbgvchbjnk,lijuhygfcbvh nmmpoiugyhjb,m ./[poiuhbjnm,k;lijuytfrcgbvhkjlipouuuujipouuuukliouygkjliubhjkml
Explanation:
Answer:
Option d) B is 1.33 times faster than A
Given:
Clock time, 

No. of cycles per instructions, 

Solution:
Let I be the no. of instructions for the program.
CPU clock cycle,
= 2.0 I
CPU clock cycle,
= 1.0 I
Now,
CPU time for each can be calculated as:
CPU time, T = 


Thus B is faster than A
Now,


Performance of B is 1.33 times that of A
Answer:
Assuming an upstander is someone that opposes cyberbullying:
(1) Call them out
(2) Report the behavior to proper moderation authority
(3) Tell the person to block messages from the cyberbully
I don't really know what else you want from this.
Cheers.
False.
The different between break and continue instruction is that with break you exit the loop, and with continue you skip to the next iteration.
So, for example, a loop like
for(i = 1; i <= 10; i++){
if(i <= 5){
print(i);
} else {
break;
}
}
will print 1,2,3,4,5, because when i=6 you will enter the else branch and you will exit the loop because of the break instruction.
On the other hand, a loop like
for(i = 1; i <= 10; i++){
if(i % 2 == 0){
print(i);
} else {
continue;
}
}
Will print 2,4,6,8,10, because if i is even you print it, and if i is odd you will simply skip to the next iteration.
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.