Answer:
public class Invitation
{
private String hostname;
private String address;
public Invitation(String n, String a)
{ // constructor that accepts two strings.
hostname = n;
address = a;
}
public String getHostname()
{
return hostname;
}
public void setAddress(String a)
{
address = a;
}
public String invite(String guest)
{
return "Hello" +guest+ ", you are invited to my party at " +address+". "+hostname+".";
}
public Invitation(String host, String address)
{
this.address = address;
this.hostname = host;
}
}
Explanation:
The Java program defines a class called "Invitation". The class constructor has two string arguments or parameters for the host of the event and the address. The invite method is used to generate the string invite message with the name of the guest as the argument. Use the "setAddress" method to set a new location of the event and the "getHostname" to get the name of the event host.
Answer:A) Syslog
Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.
Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.
Thus, the correct option is option (A).
Answer:
Determine who might be harmed and how.
Answer:
A) True
Explanation:
Industrial espionage utilizes both illegal and unethical methods in gathering information about a corporate organization in order to get business intelligence. This involves stealing intellectual property and trade secrets to use them for a competitive advantage. because Information about company's products, services, finances, sales, etc can be toold for economic warfare
Ethics:
- to ensure that privacy will not be lost.
-ensuring personal information is not lost
-information in the accountings will not be submitted or shared with anyone
-information will be saved and viewed by the business.
- The business will not falsely make the accountings.