Operating System (OS)
Link encryption

is used only to debug
None of these
can not be used in a public network
is less secure than end-to-end encryption
is more secure than end-to-end encryption

ANSWER DOWNLOAD EXAMIANS APP

Operating System (OS)
The necessary conditions needed before deadlock can occur?

Mutual Exclusion, Hold and wait, No Preemption, Circular Wait
No Mutual Exclusion, Hold and wait, Preemption, Circular Wait
Mutual Exclusion, Hold and wait, Preemption, No Circular Wait
Mutual Exclusion, No Hold and wait, Preemption, Circular Wait

ANSWER DOWNLOAD EXAMIANS APP