The first question is B.), acronym, and the second one is c.) acrostic.
Hope this helps!
Answer:
The “Information poor” are consumers who use traditional mass media information such as television, DVDs, radios and magazines. ... On the opposite “information rich” stands for a new elite within the information society.
Explanation:
Hi, you haven't provided the programing language, therefore, we will use python but you can extend it to any programing language by reading the code and the explanation.
Answer:
n1 = int(input("First numeber: "))
n2 = int(input("Second numeber: "))
for i in range(5):
r1 = n1%10
r2 = n2%10
print(r1+r2)
n1 = n1//10
n2 = n2//10
Explanation:
- First, we ask for the user input n1 and n2
- We create a for-loop to calculate the sum of each place-value of two numbers
- We obtain the last number in n1 by using the mod operator (%) an the number ten this way we can always take the last value, we make the same for n2
- Then we print the result of adding the last two numbers (place value)
- Finally, we get rid of the last value and overwrite n1 and n2 to continue with the process
Normally, wrist straps like this are used to prevent static electric discharge, which can ruin electric components.<span />
Answer:(C) Anyone with access to the personal computers could log on to the mainframe.
Explanation:
It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.
Here we have to identify the associated risk with this approach.
This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.
option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.
option (B) is incorrect because it has nothing to do anything with training of the personnel.
option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.