The thing to look for is compatible RAM, Processor and motherboard. Then I would choose my graphics card, hard drive, etc.
Answer : The securtiy of the password can be maitained by the shadow files such as:-
- max is for the days that represent that the same password can be used without the need for changing it
- min is for the days that represent waiting days before the changing of password after he/she gets a new password
- warn are the days that come with Waring sign that the password is going to expire soon.
For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.
Answer:
Data mining is a process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
Istream& operator>> (istream& input, Example& example)
{
// Extract your data from input stream here
return input;
}
Answer:
The main objective of router is to connect various networks simultaneously and it works in network layer
Explanation:
The main objective of router is to connect various networks simultaneously and it works in network layer