Answer:
You just need to click over the desktop, move to the View, and then change to medium, if its the icon size.
However, if you feel your resolution requires screwing up, then you are required to do the right-click, and again over the Desktop and then move to the settings (screen resolution),
And if you by chance clicked on the magnifier utility, you can CTRL + ALT +DEL and you will also be required to shut the interface.
Explanation:
You just need to click over the desktop, move to the View, and then change to medium, if its the icon size.
However, if you feel your resolution requires screwing up, then you are required to do the right-click, and again over the Desktop and then move to the settings (screen resolution),
And if you by chance clicked on the magnifier utility, you can CTRL + ALT +DEL and you will also be required to shut the interface.
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
Answer:
The correct answer to the following question will be "Secure".
Explanation:
This file includes information about the rights of verification and authorization.
- It will be used primarily for monitoring the use of authorization schemes.
- It holds all communications related to safety like faults in encryption.
- This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.
So, it's the right answer.
Answer:
#include<stdio.h>
#include<stdlib.h>
int main(void){
int seedval;
scanf ("%d", &seedval);
srand(seedval);
printf("%d\n", rand()%10);
printf("%d\n", rand()%10);
return 0;
}
Explanation:
The given code is poorly formatted. So, I picked what is usable from the code to write the following lines of code:
#include<stdio.h>
#include<stdlib.h>
int main(void){
This line declares seedval as integer
int seedval;
This line gets user input for seedval
scanf ("%d", &seedval);
This line calls the srand function to generate random numbers
srand(seedval);
This prints a random number between 0 and 9
printf("%d\n", rand()%10);
This also prints a random number between 0 and 9
printf("%d\n", rand()%10);
return 0;
}
1-plain text
2-hypertext
3-none of the above
4-none
5-confidentiality
6-private key
7-delivery receipt
8-delay
9-to do
10-permission
11-categories
12-complete
13-responses
14-signature
15-theme
man , that was crazy homework , not that much here in UK