Answer:
Option B is the correct answer for the above question.
Explanation:
Encryption is techniques that give the features to hide the original text in the back of some other text which has no means for the other person. It is a technique that is followed by the person at the time of message transfer. The encryption changes the original message into a duplicate message on the sender ends and get the original message from the duplicates message on the destination ends with the help of some algorithm.
The above question asked about the techniques which convert the message into duplicate one so that no unauthorized user can read the message. Then the techniques known as Encryption which is stated from the option B. Hence Option B is the correct answer while the other is not because--
- Option A states about integrity which is not a technique to change the original message into a duplicate message.
- Option C states about analysis which is also not a technique to change the original message into the duplicate message.
Answer:
Total time = 190 ms
Explanation:
The requests missing in question are:
Requests ( A, 80) , (B,75) , (C,82) , (D,90) , (E,45)
Number of movements = | 70 - 45 | + | 45 - 0 | + | 0 - 75 | + | 75 - 80 | + | 80 - 82 | + | 82 - 90 |
= 35 + 45 + 75 + 5 + 2 + 8
= 70 + 80 + 10
= 160
Time taken for seek = 160 * 1 ms = 160 ms
Time taken for servicing request = Number of tracks * Time for each track = 5*6 = 30
Total time = 160 + 30 = 190 ms.
Answer:
Hard Drive
Explanation:
hard drive (also known as the hard disk), is the primary storage device of a personal computer.
Answer:
By keeping track of file links and deleting them along with the files
Explanation:
when different users create different files with the same name, and one tries to open one of the files, the first file that is found on the VTOC of the disk will be opened. These problems can be avoided by tracking of all links to a file, and whenever there is a need to delete a file, the link to the file as well should be deleted.