Answer:
Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.
Explanation:
Answer:
Encapsulation:-It is the binding of the data and functions so that they works as one unit.
Inheritance:-When one class acquires the property of another class it is called inheritance.
Polymorphism :-It generally means more than one form
Explanation:
Encapsulation:- class is an example of encapsulation it can hold different data types and functions in a single container called class.
class Name{
public:
string first_name;
string last_name;
void Display()
{
cout<<first_name<<" "<<last_name<<endl;
}
};
Inheritance:-The property of a class acquiring the properties of another class is called inheritance.
Now we will inherit the above defined class.
class person: public Name
{
public:
char gender;
int age;
void Display()
{
cout<<first_name<<" "<<last_name<<gender<<age<<endl;
}
};
int main()
{
Name n;
person p;
n.Display();
p.Display();
}
Polymorphism- There are two types of polymorphism:-
1.Run time polymorphism=The values are decided at run time.
2.Compile time polymorphism=The values are decided at compile time.
Example:-In the above example we have function Display() in both the classes.This is an example of compile-time polymorphism. We are deciding at the time of compilation which display to use.
Answer:
Kindly check explanation
Explanation:
Laws refer to legal rules and regulatory framework which is used as a guiding principle to define the actions and behavior which may lead to incurring penalties if boundaries are trespassed.
The word 'Cyber' is popularly used to describe activities, actions and interactions involving the internet. With the burst and continous pace of digital transformation, the internet also called Cyberspace is in a world of its own. Hence, the creation of rules to govern internet interactions.
Cyber laws may thus be explained as codified laws which are designed and implemented to govern all forms of possible online interaction or transactions in other enhance cyber security to protect the interest of persons and data from various forms of internet threats. Cyber laws include ; Data protection laws, Computer crime laws, telecommunication laws and so on.
Answer:
"Resolution" and "Refresh rate" is the correct answer.
Explanation:
Resolution:
- The resolution would be a step for describing the spatial brightness as well as cleanliness of something like a photograph but rather an image. It's always commonly being utilized for the performance evaluation of monitoring devices, digital photographs as well as numerous additional technology components.
Refresh rate:
- A computer display as well as visualization technology feature that determines the equipment frequency as well as capacity for repainting or re-drawing that this whole presentation upon on-screen for every instant.
Answer:
It is good but the back is not good enough.