Answer:
Explanation:
1. Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user. Authorization involves providing a user with permission, including access levels and abilities. For example file access, hours of access, and amount of allocated storage space.
2. Content filtering is a software organizations use that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security branch, an intruder is then unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.
3. Intrusion detection software (IDS) features full-time monitoring tools that search for patterns in network traffic to identify intruders.
Answer:
Motivation? The search problem.
Sorting algorithms: insertion sort, shellsort, heapsort, mergesort, quicksort, bubblesort
At the very least, "general purpose" sorting algorithms require O(n log n) comparisons
Explanation:
Digital cellphones use Digital Compression to reduce the size of the channels that are required, by scattering the digital fragments of conversations over many channels
Answer:
Pseudocode is as follows:
// below is a function that takes two parameters:1. An array of items 2. An integer for weight W
// it returns an array of selected items which satisfy the given condition of sum <= max sum.
function findSubset( array items[], integer W)
{
initialize:
maxSum = 0;
ansArray = [];
// take each "item" from array to create all possible combinations of arrays by comparing with "W" and // "maxSum"
start the loop:
// include item in the ansArray[]
ansArray.push(item);
// remove the item from the items[]
items.pop(item);
ansArray.push(item1);
start the while loop(sum(ansArray[]) <= W):
// exclude the element already included and start including till
if (sum(ansArray[]) > maxSum)
// if true then include item in ansArray[]
ansArray.push(item);
// update the maxSum
maxSum = sum(ansArray[items]);
else
// move to next element
continue;
end the loop;
// again make the item[] same by pushing the popped element
items.push(item);
end the loop;
return the ansArray[]
}
Explanation:
You can find example to implement the algorithm.
Answer:
Hackers frequently spend long hours examining the types and structures of targeted systems because they must use guile, or fraud to bypass the controls placed on information owned by someone else.
Explanation
The perception of a hacker has evolved over the years.
- The traditional hacker profile was a male, aged 14 to 18.
- 76% of hackers are men whose ages are between 14 years (8%) to 50 (11%). The average age is 35 years (43%).
- A hacker is persevering, patient, creative, bright and having a passion for what he does.
- Hackers today can be expert or novices.
- The experts create the software and schemes to attack computer systems.
- While the novices merely use software created by the experts.