Answer:
The procedure or subprogram must start with the word ‘to’, followed by a name we think of. The next step is to key-in all the same steps we would write on the command line. The procedure must end with the word ‘end’. All comment or remark lines should be preceded by semi-colon (;).
Explanation:
to procedurename steps of your procedure here end
Certain extensions of files. Sometimes, the name of the file could be something like Trojanx64.sys(I think). I had a few files of malware, but they were deleted. I believe the most common extension is .sys for viruses. Additionally, antivirus software could look into the properties of the program/process.
Answer:
Source port number and destination port numbers for segment travelling from HOST B to HOST A are : Source port number is y , and Destination port number is x.
Explanation:
Because in problem statement it given that the TCP segments traveling from Host A to Host B have source port number x and destination port number y. So it is clear that that Host A has a port named x and Host B has a port named y and when segments travels from Host B to Host A the Host B's port becomes source and Host A's port becomes source.
I would say get a virus protector webroot, Norton,avast,ect