<u>Explanation:</u>
a.
- One user can read the private data of another user-privacy.
- One user can prevent another user from getting anything done-denial of service.
Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.
b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.
Explanation:
Deep Learning enables image processing, speech recognition, and complex game play in Artificial Intelligence
<span>A numeric string is created by a cryptographic
algorithm, which is called a hash that is used to validity of a message or authenticity
of a document. The signature is verified by an algorithm that uses the stated
owner of the signature's public key to accept or reject the authenticity of a
signature. A certification authority's digital signature is used to verify the
authenticity of digital certificates and other documents in a PKI.</span>