Answer:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
Explanation:
Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.
An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:
- It defines what is required from organization’s employees for the security of the IT systems
- Information security policies provide a means to secure the organization against external and internal threats
- Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
- Information security policies are created to hold each employee responsible with regard to information security
Answer:
for count in range (5,8): numA=numA+count print(numA)
Explanation:
Answer:
Information about the parts of a cell, its location and role will help describe the appearance of a cell's content.
Organelles are cell structures that include the nucleus, cytoplasm, cell membrane among others. One can view these using a light microscope.
1. Cell Membrane is a fluid mosaic. It is the outer boundary of the cell.
2.Cytoplasm is the fluid inside the cell. It is located between the nucleus and the cell membrane.
3.Nucleus is the control center of the cell and is located at the center.
Answer:
3 bits
Explanation:
Given a 4- way set associative cache that has 64 blocks of 16 words.
Therefore, the number of sets cache has:

Now,
Cache data size is 16kB
The number of cache blocks can be calculated as:

Now,
Total sets = 
Total sets = 
Now,

n = 6
For 15 bit address for the architecture, the bits in tag field is given by:
15 - (6 + 6) = 3 bits
Thus the tag field will have 3 bits