Answer:
Algorithms.
Explanation:
Computer system is an electronic machine that receives input data, processes or executes these data and outputs the results. It comprises of two parts, the hardware and software components.
The computer receives data created by a process and inputted by individuals. The software components are the operating system and the application softwares running in the operating system. The application software follows a well defined stages of task to execute a task. This is called algorithm.
The application uses the algorithm to execute the task on the input data to give the required result.
<span>Answer: Metasearch engines</span>
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is d- 346px.
The complete code of this example is given below:
<div>
style="margin:20px; border:solid 3px #888888;">
</div>
while the image width is 300px.
It is noted that the image width is 300px and the margin is 20 px.
Margin:20px means that image margin from four side is 20 px each.
So the width of dive from both side increase to 40 px and the image has 300 px, then total width becomes 340px. Now the border also has 3px of four sides of the image, then the width of the border becomes 6px.
so the total width of the div tag is 346 px.
In short, we can calculate the width of tag as below:
total width of div= width of image+ width of margin+ width of border
total width of dive= 300px+40px+6px
total width of div=346px.
Answer:
4. A Denial of Service attack (DDOS attack).
Explanation:
A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.
In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.
Thus, regular users are not able to access their services.
Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.
Answer:
Some key points to remember, when handling the linked list are as follow:
- Linked list is the linear data structure in which each of the elements contain separate object.
- Linked list components are not store in a contiguous location.
- In the linked list the elements or components are basically use the pointers for linked with another elements.
- The last node of the linked list must contain null value.
- In the linked list, the allocation of the memory is equal to upper node limit.