Answer:D.Social interaction.
Explanation: Social interaction is the term used to explain the social exchanges taking place between two or more people. Through social interaction people design rules,regulations, institutions and systems within which they live their lives.
In late adulthood,social interaction is very vital to help the person to develop a good self esteem, the LPN/LVN(licensed vocational nurse/license practical nurse) plan should include social interaction to help the client.
<u>Swap files </u>contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost any other work that has occurred during past Windows sessions.
Explanation:
I order to simulate extra space an operating system like windows use hard disk space in order to stimulate extra memory.When a computer system is running low with the memory space the swap file swaps a section of RAM onto the hard disk in order to obtain a free memory space.
This Process at times results in slowing down of the computer computer considerably.
<u>The combination of RAM and swap files is known as virtual memory.</u>
It is due to the use of virtual memory that our computer is able to run more programs than it could run in RAM alone.
Answer:
Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only
Explanation:
- XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
- This involves sending server side scripts which are executed by the user and these may even change the html pages too.
- Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
- This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
- In this type of attack, the attacker tries to inject the code remotely.
- Option (c) is correct and options (a),(b) and (d) are wrong options.
Answer:
monitor fileSharer
{
enum {THINKING, WAITING, READING} state[N];
condition self[N];
int total;
void open(int i) {
state[i] = WAITING;
if (i + total >= N)
{ self[i].wait(); } // Leaves monitor
state[i] = READING;
total += i;
}
void close(int i) {
state[i] = THINKING;
total -= i;
// Can signal one waiting proc whose ID won't break bank.
for (int x = N - total - 1; x >= 0; x--) {
if (state[x] == WAITING) {
self[x].signal(); break;
}
}
}
initialization.code() {
for (int i = 0; i < N; i++) {
state[i] = THINKING;
}
total = 0;
}
}