A 5GL fifth-generation languages a programming language design to solve given problem without programmer. The user only needs to solve the problem and condition without implementing an algorithm.
Explanation:
First Generation Language
The first generation language is called low- level style because they were used at a superficial level of abstraction. First-generation language referred to as the native language.
Second Generation Language
The second-generation language is also low-level language or assembly language. The second level of language uses the concept of mnemonics for the writing program. Symbolic name are used.
Third Generation Language
The third-generation language overcomes the first and second-generation languages. Third generation language is considered as high- level language because the target is to focus on the logic of the program.
Fourth Generation Language
The language of generation required a lot of time and effort that affect programmers.The fourth-generation was developed to reduce the time, cost, and effort.
Fifth Generation Language
The programming language of this generation focuses on constraints programming. The fifth-generation programming languages are Artificial Intelligence and Artificial Neural Network.
Answer:
Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.
Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.
Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system
Answer:
Nonexclusive forwarding
Explanation:
In Nonexclusive forwarding, DNS forwarding is setup so that if the DNS server receiving the forwarded request cannot resolve the name, then the server that originally forwarded the request makes an attempt to resolves it. If that fails, the server sends a request to its designated forwarder.
We have information:
3.8 billion 1 second
x billion 0.6 second
To find out the number of operations we need to cross multiply these equations and solve for x.
3.8 * 0.6 = 1*x
x = 2.28 billion
In 0.6s computer can do 2.28 billion operations.
Answer:
Online or Web Proxy
Explanation:
Web or online proxy allows you to hide your Internet Protocol (IP) address from the website you are trying to visit or access. It is like a shield between the website you are accessing and you. They can be seen as a middleman between you and the site you are visiting and as such, the site sees that a specific IP address is accessing its server but the address is not yours as all requests between your computer and the web server are first passed through the proxy server.
<em>Hope this helps!</em>