Answer:
Hackers frequently spend long hours examining the types and structures of targeted systems because they must use guile, or fraud to bypass the controls placed on information owned by someone else.
Explanation
The perception of a hacker has evolved over the years.
- The traditional hacker profile was a male, aged 14 to 18.
- 76% of hackers are men whose ages are between 14 years (8%) to 50 (11%). The average age is 35 years (43%).
- A hacker is persevering, patient, creative, bright and having a passion for what he does.
- Hackers today can be expert or novices.
- The experts create the software and schemes to attack computer systems.
- While the novices merely use software created by the experts.
Answer:
True is the correct answer for the above question
Explanation:
- The OSI security architecture is a security framework that is used to secure the data packets when it is going to transfer on the internet for communication.
- It is used to define the security rules and mechanism which need to secure the data packets.
- It mainly focuses on Security services, Security attacks, Security mechanisms.
- The above question-statement states about the framework which defines the security mechanism to secure from the attacks are known as OSI Security architecture which is the correct statement which is described above. Hence True is the correct answer.
Answer:
Option a
Explanation:
The Critical Path Method is the arrangement of booked exercises that decides the term of the task. These planned exercises must be performed if the venture is to be viewed as a triumph.
Therefore, options b, c, d and e can't be true because:
b. Activities in the Critical Path Method has no or zero slack.
c. The duration of the critical path in CPM determined on the basis of the latest activity and the earliest initiation.
d. The CPM method schedules the activity of the longest duration.
Answer:
MAR bit
Explanation:
The MPC computers area set of software and hardware standards that was developed by the consortium of computer firms which is led by Microsoft. It contains the address of a next microcode for the Mic1 emulator foe execution.
The part of the executing microcode instruction that determines the value which is placed in the MOC is the MAR bit. The MAR is the memory address register in the CPU which stores the memory address or such addresses to which some data will be sent and also stored.
Answer: (A) Fixed interval
Explanation:
The fixed interval schedule is the type of schedule of the reinforcement in the operand conditioning in which the the initial response are rewarded by some specific amount of the time.
The main issue with the fixed interval schedule is that the people have to wait until the reinforcement schedule get occur and start their actual response of interval. This type of reinforcement schedule occur as the output value does not posses constant value all the time.
Therefore, Option (A) is correct.