Answer:
I love Chipotle!
Explanation:
I don't know, maybe because the food there is really good.
ICF is a type of fusion energy research that attempts to initiate a nuclear fusion reaction by heating and compressing a fuel target. Its normally in the form of a pellet that most often contains a mix of deuterium and tritium.
A nuclear reactor is a device used to initiate and control a sustained nuclear reaction. Nuclear reactors are used at nuclear power plants for electricity generation.
Compare: they are both nuclear, they both produce energy, they both are used at power plants.
Contrast: ICF uses fusion, while a nuclear reactor is used to control a sustained nuclear reaction.
This is all I can help with. By the way, are you in rocket science? 'Cause this stuff is hard.
Answer:
Explanation:
The dual of a function means replace AND with OR and replace OR with AND.
XOR gate of A , B is

So, Dual of A XOR B is ( replace AND with OR and OR with AND)
Complement of A XOR B is
(In finding compliment AND becomes OR and OR becomes AND ).
By inter changing the above product of terms
Complement of 
So, Dual of A XOR B = Complement of A XOR B.
Answer:
bool identicaltrees(Node* root1,Node* root2)//function of type boolean true if idenctical false if not.
{
if(root1==NULL&&root2==NULL)//both trees are null means identical.
return true;
if(roo1 && root2)
{
if(root1->data==root2->data)//condition for recursive call..
{
return (identicaltrees(root1->left,root2->right)&&identicaltrees(root1->right&&root2->right);
}
}
else
return false;
}
Explanation:
In this function it of type boolean returns true if both the trees are identical return false if not.First we are checking root node of both the trees if both are null then they are identical returning true.
If both root nodes are not null then checking their data.If data is same then recursively traversing on both trees and checking both trees.
else returning false.
Answer:
Advanced persistent threat.
Explanation:
Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.
It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.