Answer:
Query Wizard
Explanation:
We can use the Query Wizard to automatically create a selection query, but in this case, we have less control in our details of the query design, it's the fastest way to create a query, even detect some design errors.
Steps to use the Query Wizard
1) In the Queries group on the Create, click Query Wizard
2) Add fields
3) On the last page of the wizard, add a title to the query
Answer:
int age = 10;
switch (age){
case 0:
case 1:
System.out.println("ineligible");
break;
case 2:
System.out.println("toddler");
break;
case 3:
case 4:
case 5:
System.out.println("early childhood");
break;
case 6:
case 7:
System.out.println("young reader");
break;
case 8:
case 9:
case 10:
System.out.println("elementary");
break;
case 11:
case 12:
System.out.println("middle");
break;
case 13:
System.out.println("impossible");
break;
case 14:
case 15:
case 16:
System.out.println("high school");
break;
case 17:
case 18:
System.out.println("scholar");
break;
default:
System.out.println("ineligible");
}
Explanation:
In java and many other programming languages, a switch statement is a way of having multiple branching options in a program. This is usually considered a more efficient way than using multiple if....else if statements. and the expression variables could be byte, char int primitive data types. etc. every branch (option) in a switch statement is followed by the break statement to prevent the code from "falling through". In the question The variable age is declared as an int and initialized to 10. and tested against the conditions given in the question.
Answer:
Task manager
Explanation:
Allows you to force quit applications.
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).