```
#!/usr/local/bin/python3
import sys
def print_factorial( user_val ):
if( user_val < 1 ):
return( 1 )
else:
return( print_factorial( user_val - 1 ) * user_val )
if( __name__ == "__main__" ):
if( len( sys.argv ) == 2 ):
print( print_factorial( int ( sys.argv[ 1 ] ) ) )
else:
sys.stderr.write( "usage: %s <integer>\n" % sys.argv[ 0 ] )
exit( 0 )
```
Answer:
The data can be safeguarded using key escrow procedure.
Explanation:
Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.
Answer:
Teredo tunnelling
Explanation:
The tunnelling method that will fit best in the situation is teredo tunnelling. The reason are embedded in its characteristics, they include;
Teredo tunneling has the following characteristics: Its tunnel endpoints are configured on hosts. The hosts are dual stack hosts and perform tunneling of ipv6 to send on the ipv4 network works through NAT the only solution that allows ipv4-only hosts to communicate with ipv6-only hosts is NAT-PT.
Answer:
1.c 2.a
Explanation:
If the new emails she doesn't need could be ignored in spam. the old ones are useless so trash em.
Answer:
Given address = 94EA6
tag = 0 * 94 ( 10010100 )
line = 0 * 1 D 4 ( 111010100 )
word position = 0*6 ( 110 )
Explanation:
using the direct mapping method
Number of lines = 512
block size = 8 words
word offset =
= 3 bit
index bit =
= 9 bit
Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit
Given address = 94EA6
tag = 0 * 94 ( 10010100 )
line = 0 * 1 D 4 ( 111010100 )
word position = 0*6 ( 110 )