Answer:
64
Explanation:
We have given the 32 bit architecture
We know that 1 byte =8 bit
So memory of given architecture 32 bit 
Total memory = 256 bytes
So total number of instruction that fit into 256 bytes 
So total 64 instruction can be fit in 256 byte memory.
Answer:
1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.
3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.
Explanation:
All of these can be used to steal data & passwords
Explanation:
Logical functions provide decision-making tools for information in a spreadsheet. They allow you to look at the contents of a cell, or to perform a calculation, and then test that result against a required figure or value.
Answer:
Explanation:
How to meet people in real life
1. We can meet people if you go to your friend's party, is a great opportunity to meet friends from your friends.
2. We must go to events, in this case, if you like to read books, go to reading events.
3. We can use public transportation if you see someone reading your favorite book is the best opportunity.
How to meet people online
1. We can meet people in social media, but there are a lot of fake accounts, take care.
2. There are special platforms to meet people or to find love.
3. We could meet people on educational websites or apps, for example, if we want to learn Spanish, we can meet Spanish people.