Answer:
IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.
Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
<h3>How is virtual memory used instead of RAM?</h3>
A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.
With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.
Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be isolated from the other processes.
Learn more about virtual memory from
brainly.com/question/13088640
#SPJ1
Numeric Keypad is the answer
Answer: One backup router
Explanation:
A stub network is the type of the packet network that basically describe the computer notwork. It typically capable for sending the complex data in the single network path when the network aware about its destination.
A stub network contain the one backup router as the stub routing is the typically designed for conserve the resources of the local router like the central processing unit (CPU) and the memory. It basically improve the stability of the network in the system.