MICROPROCESSOR AND MICROCONTROLLER

INTRODUCTION TO MICROPEOCESSOR

MICROPROCESSOR BASICS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Abhi designed a system where he used the a common clock inputs to make his modules communicate with each other and to the peripherals over the data lines. One fine day while he was using his system, he was convinced that someone has gained access to it in an unethical way. Which of the following observations would have lead him to conclude that it is actually the case?
A
the data bus was containing rubbish data
B
the address bus was containing rubbish data
C
one signal called Bus request/Hold was present in the system
D
the system was working very slowly with a slow peripheral
E
if clock input was trashed, the system breaks down
Explanation: 

Detailed explanation-1: -A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.

Detailed explanation-2: -Hackers can figure out your passwords by stalking your social media profiles to find information commonly used in passwords such as children’s names, or they can simply try out a list of commonly used passwords until they hit the right one.

Detailed explanation-3: -White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.

Detailed explanation-4: -Phishing is the most common hacking technique. All of our inboxes and text messaging apps are filled with phishing messages daily.

There is 1 question to complete.