The correct answer should be process type of software metric. The process metrics are used to help in strategic decision making. The processes such as work products delivery, expended human hours and conformance to quality and schedule are all metrics in the process domain.
<u>Pros :- Social media:</u>
- Normally using is good up to one stage where information of organization is not shared through social media.
- News day social media is used to share the common information with validation.
- In social media access by end user out of office hours.
<u>Cons:- Social media:</u>
- In an organization an important files or document or media is shared then it is danger.
- Mostly end user access the social media in office hours then growth of organization is will be affected.
- Since end user using the organization internet then cost of internet will rise.
Answer:
(A) Add.
Explanation:
The add method of queue inserts an element at the tail of the queue.
syntax:- queue.add(element);
It's return type is boolean it returns true if the insertion is successful and returns false if the insertion is unsuccessful and it returns an IllegalSpace Exception if there is no space left to insert an element in the queue.
Answer:
a. True
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be subjected to frequency analysis.
The Playfair Cipher is generally considered to be the best multiple letter encryption cipher because it processes digrams in the plaintext as singular units and translates them directly into ciphertext digrams.
In the Playfair Cipher, a 5 × 5 matrix comprising of letters is developed using a keyword and then, the matrix is used to encrypt the plaintext as a pair i.e two letters at a time rather than as a single text.