## Question: 1. Explain the difference between an attack surface and an attack tree. (2 points) 2. Consider an…

1. Explain the difference between an attack surface and an attack tree. (2 points) 2. Consider an automated teller machine (ATM) to which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement. (5 points) 3. Repeat problem 2 for a telephone switching system that routes calls through a switching network based on telephone number requested by the caller. (5 points) 4. Consider a desktop publishing system used to produce documents for various organizations: a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement. b. Give an example of a type of publication in which data integrity is the most important requirement Give an example of a type of publication in which availability is the most important requirement (6 points) c.Continue reading

## Question: 20. The output of the following code is 5 5. Which of the following correctly replaces the missin…

please i need it quick thank you teacher 20. The output of the following code is 5 5. Which of the following correctly replaces the missing lines in the code? maino { int a, *ptr, arr[] = {1,2,1,2); ptr = arr; //line1 printf("%d", a); //line2 printf("%d", a); } (4 Points) line 1: a = "ptr+ + + 3: and line2: a = "ptr+ + + 3: 3 line 1: a = 'ptr+ + + 3: and line2: a = + + *ptr line 1: a = - +*ptr + 3: and line2: a = ++*ptr + 3 line 1:2 = + +*ptr + 3: and line 2: a = 'ptr+ + + 3; 30. Consider the following declarations: A) B) char *liverpool = "You will never walk alone"; char liverpoolarr[] = "You will never walk alone"; Which of the following is true for the lengths of strings in A and B? (2 points) the length of the string in A is greater than the length of the string in B the length of the string in B is greater than the length of the string in A the length of the string in A is equal to the length of the string in B the length of the string in A is 26Continue reading

## Question: Briefly describe each of the following object-oriented programming features. a) Attributes b) Met…

Java Questions Briefly describe each of the following object-oriented programming features. a) Attributes b) Methods c) Data hiding/access control d) Describe the overall purpose of defining classes and Objects e) Primitive data type vs. an object f) Static variables and methods vs. non-staticContinue reading

## Question: Programming Language: C++ Study the lines of code below int i = 32, *pi = &i; char c = ‘A’, &…

Programming Language: C++ Study the lines of code below int i = 32, *pi = &i; char c = 'A', &co = c; *pi += c; co += i; What are the integer values stored in i and c? NOTE: The ASCII value of "A" is 65.Continue reading

## Question: Prove: Let C be the number of connected components in G. Then the number of connected components …

Prove: Let C be the number of connected components in G. Then the number of connected components in G′ is 2C if and only if the graph G is bipartite. Please help!Continue reading

## Question: Given three registers REG_A, REG_B and REG_C, at addresses 0x7000468, 0x7000469 and 0x700046A, re…

Given three registers REG_A, REG_B and REG_C, at addresses 0x7000468, 0x7000469 and 0x700046A, respectively; what should be written in the parentheses so that this code writes 0 to REG_B? REG_B = ( 0;Continue reading

## Question: If avoiding deadlock is key, which of these priority inheritance protocols would you pick? Select…

If avoiding deadlock is key, which of these priority inheritance protocols would you pick? Select all that apply. Select one or more: BIP HLP none of these NPPContinue reading

## Question: 19. The output of the following code is 3 3. Which of the following codes may replace the missing…

19. The output of the following code is 3 3. Which of the following codes may replace the missing code below? #include int x = 5: int main int x = 3: printf("%d", x); { //missing code } printf("%d". x): return 0; } (ii) x=4 (ii) int x=3 (iv) x=3 Qint x=4 (4 Points) (iv) only (ii) and (iv) only 6 cili) and (iv only ) and (ii) onlyContinue reading

## Question: + Using 5 G how to G Operatin En Whats Google Practice W multiple G correct Mala – No Slid: B6 2….

want the average of waiting time + Using 5 G how to G Operatin En Whats Google Practice W multiple G correct Mala - No Slid: B6 2.01 Bb 2.01 Bb 201 Bb 2.01 Bb CPUS oh *** M SIN 2 * Ims kau.edu.sa/webapps/assessment/take/takejsp?course_assessment_id-_377876_18.course_id-_357070_1&.content_id-_6847298_1&question_num_3x-0&toggle_state-Show&st.. > Remaining Time: 37 minutes, 48 seconds *Question Completion Status: port SUVEITSWT Using Shortest Remaining First (SRF) scheduling algorithm, calculate average waiting time for the following 6 processes P Burst Time Arrival Time 0 7 1 2 1 2 5 3 -- 3 4 5 6 3 4 5 2 1 For the toolbar, press ALT F10 (PC) or ALT EN F10 (Mac). TT T F Paragraph Arial 3 (12pt) - T... *DOQ TT, TT - - fx Mashups - © @EEEEE! HTML CSS Pathop Words:0 عرض الكل X COIS493-Assign...dom CONS493-Assign....doc [EgyBest. Luthe S...mp4 Egy Best).Luther.S.mp4 3 Information Truth...docx Information Truth...docx ادا کی ENG 4) DA e 9 e w HE لم اكتب هنا للبيت E1/11/Continue reading

Scroll to top