Answer: Function
Explanation: <em>"Function is a criterion that is met when the part performs its stated purpose effectively and reliably. In an electronics product, for example, function can depend on the solid-state components used, the software or firmware, and quite often on the features of the electronics enclosure selected. Poorly placed or sized ports and misleading or missing labeling are two of the most common ways in which an enclosure can fail the function criterion."</em>
Answer:
d. public myClass( ) {. . .}
Explanation:
A constructor is a special method that is called when an object of a class is created. It is also used to initialize the instance variables of the given class. A class may have one or more constructors provided that these constructors have different signatures. A class that does not have a constructor explicitly defined has a default parameterless constructor.
Having said these about a constructor, a few other things are worth to be noted by a constructor.
i. In Java, a constructor has the same name as the name of its class.
For example, in the given class <em>myClass</em>, the constructor(s) should also have the name <em>myClass</em>.
ii. A constructor does not have a return value. It is therefore wrong to write a constructor like this:
<em>public void myClass(){...}</em>
This makes option a incorrect.
iii. When a constructor with parameters is defined, the default parameterless constructor is overridden. This might break the code if some other parts of the program depend on this constructor. So it is advisable to always explicitly write the default parameterless constructor.
This makes option d a correct option.
Other options b and c may also be correct but there is no additional information in the question to help establish or justify that.
Answer:
c) data management software
Explanation:
Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called data management software.
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.