The Windows registry hive that stores information about object linking and embedding (OLE) registrations is called; HKEY_CLASSES_ROOT
<h3>Window Registry Hive</h3>
Window Registry hive is basically a folder in the Windows Registry, but it is also a registry key. Now, there are different types of window registry hives such as;
Among all the types of window registry hives listed above, the only one that stores information about object linking and embedding (OLE) registrations is called HKEY_CLASSES_ROOT.
Read more about Window Registry at; brainly.com/question/14364696
Answer:
Malware
Explanation:
Malware is used in many types of software included handheld OS's
Answer:
Following are the program to this question:
#include <iostream> //defining header file
#include <fstream>//defining header file
using namespace std;
int main()//defining main method
{ string name; //defining string variable
int age; //defining integer variable
cout << "Enter your name: "; //print message
getline(cin, name); //input value using getline method
cout << "Enter your age: "; //print message
cin >> age; //input value
ofstream outdata("outdata"); //using ofstream method
outdata << name << " " << age << endl; //print value
outdata.close(); //closing outdata.
return 0;
}
Output:
Enter your name: dev
Enter your age: 22
please find the attachment.
Explanation:
Description of the above can be described as follows:
- In the main method, two variable "name and age" is declared, in which name is string variable, and age is an integer variable, in both variable, we take user input, but in the name variable, the inline method is used, that take input from the user end.
- In the next step, ofstream method is used, which creates an object "outdata", which prints user input value in the "outdata" file separated by a single space.
Answer:
B. Sniffer
Explanation:
The type of program that is being discussed is called a Sniffer. This can either be a software or hardware that allows the user to intercept data flowing from a computer to the internet in real-time before it reaches its destination. The program can be very vague and intercept all the data coming and going to the target computer or it can be very specific and intercept only the data in which it was programmed to target (sniff out). Cyber Criminals use these programs/devices to steal valuable information that they know a user is going to send sooner or later over the internet.
Answer:
These are microscopic and represent the binary information of the data stored on the disc.
Explanation: