Answer:
The statements which are true are;
- A user-defined data type can include other user-defined data types
- A user-defined data type is defined using a class
- A user-defined data type can include a list
Explanation:
A user-defined data type (UDT) is a datatype that is defined and derived by the use of the datatypes which preexist including existing user-defined datatypes and the built-in datatypes
It is therefore true that a user-defined data type can include other user-defined data types
A class is a user-defined data type that contains both its member data and member functions, that can be used when an instance of the class is first created
Therefore, a user-defined data type is defined using a class
In a user-defined data type, a variable has actual data within it which can include an array or list
Therefore a user-defined data type can include a list.
<u>Implication of technological literacy to a teacher training today
:</u>
- First of training has to be under technology literacy before training starts. Trainer also should have enough knowledge on technology literacy.
- Trainer can take printed materials to share the document on the topic which to be covered and circulated to trainers
- Since it given as general topic, training teacher has to cover the following topic, general on computer and purpose of computer today's life, life cycle of computer grown from old PC to laptop and tablet.
- Next topic such be covered operating system and explain about the operating system and different technology is used.
- Revolution on technology should be also covered and explained in details.
Explanation:
Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as ethical .
There are certain reasons where one's email,voice mails and computer files can be monitored are as following:
- Protect the security information and security.
- Investigation of complaints of harassment.
- Preventing personal use of employer's facilities.
Answer:
it helps in communication, posting and sharing memory
The first one, "<span>A </span>SYN flood<span> is a form of denial-of-service attack in which an attacker sends a succession of </span>SYN<span> requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic." </span>