A. review or print them later
Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.
Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems or
weaknesses that prevent malicious attacks.
To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer. This was a malicious attack.
However, sometimes people can be specifically targeted to steal their data or monitor their activities.
Answer: That due to the specific tasks that needs to be accomplished by each program to make an all encompassing program would be inefficient and full of bugs
Explanation: try to do something along those lines ex why would MySQL be used to check your essay for grammar the tasks are on opposite spectrums
Answer:d) Mono-alphabetic substitution rules
Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.
Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.
Answer:
- public class Main {
-
- public static void main (String [] args) {
-
- for(int i = 1; i < 10; i++){
- int num = 0;
- num += i;
- }
- System.out.println(num);
- }
- }
Explanation:
In programming each variable has its scope. For example, a variable defined within the for loop has no longer exist outside the loop body. To illustrate this we can write a short program as presented above.
Firstly, create a for loop that traverse the number 1 - 10 (Line 5 - 8). Within the loop create a variable num and initialize it with zero (Line 6) and increment it with i value for each iteration (Line 7).
Outside the loop, we try to print the num (Line 9). When we run the program this will result in an error as the num which is declared inside the for loop will no longer exist outside the loop body.