Operating System (OS)
Link encryption

None of these
can not be used in a public network
is less secure than end-to-end encryption
is used only to debug
is more secure than end-to-end encryption

ANSWER DOWNLOAD EXAMIANS APP

Operating System (OS)
The necessary conditions needed before deadlock can occur?

Mutual Exclusion, Hold and wait, Preemption, No Circular Wait
Mutual Exclusion, Hold and wait, No Preemption, Circular Wait
Mutual Exclusion, No Hold and wait, Preemption, Circular Wait
No Mutual Exclusion, Hold and wait, Preemption, Circular Wait

ANSWER DOWNLOAD EXAMIANS APP