The answers to the question are:
- True
- True
- True
- True
- False
- true
- True
- True
- False
- False
- false
- False
- True
<h3>Which words are combined to form malware?</h3>
Malware is known to be a kind of malicious software and it covers viruses, worms, trojans and other bad computer programs that is often used by hackers to wreak and steal information from system.
The types Of Expansion Cards are:
- Sound Card
- Graphics Card
- Network Interface Card
- Modem,
A sound card known as an audio card which is said to be an internal expansion card that helps to give input and output of audio message to and from a computer system.
Learn more about sound card from
brainly.com/question/26964065
#SPJ1
Answer: False
Explanation:
As for the encoding process we require encoder, decoder, modulator which is less expensive than those required for modulation where we need devices for changing the amplitude, frequency and phase, which is more complex and expensive
Answer:
Offset bits: 3-bits
Set number of cache: 12-bits
Tag bits: 7-bits
22-bit physical address
Explanation:
Since the system is 32K so,
=2⁵.2¹⁰
=2¹⁵
As we know that it is 8-way set associative so,
=2¹⁵/2³
=2¹⁵⁻³
=2¹²
2¹² are cache blocks
22-bit physical address
Off-set bits are 3 as they are calulated from 8-way set associative information.
Set number of cache : 12-bits
For tag-bits:
Add off-set bits and cache bits and subtract from the total bits of physical address.
=22 - (12+3)
=22 - 15
=7
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>