Smart phones and wireless devices
<u>Threat </u>is some danger that can exploit a vulnerability.
<h3>What is Threat?</h3>
Threat is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as accidentally, and take or damage, the asset of a person.
Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.
Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.
Learn more about vulnerability from
brainly.com/question/25633298
#SPJ1
Answer:
In a <u>little endian computer</u> -The data's least substantial byte is put at the lower address byte. The remaining information will be put in memory in order in the next three bytes.
a)1234
4 is placed at the least significant bits,so this byte stored at lower memory address.
1 is placed at the most significant bits,so this byte stored at higher memory address.
b) ABFC
C is placed at the least significant bits,so this byte stored at lower memory address.
A is placed at the most significant bits,so this byte stored at higher memory address.
c) B100
0 is placed at the least significant bits,so this byte stored at lower memory address.
B is placed at the most significant bits,so this byte stored at higher memory address.
d) B800
0 is placed at the least significant bits,so this byte stored at lower memory address.
B is placed at the most significant bits,so this byte stored at higher memory address.