Answer:
This is a heading
Explanation:
This is a paragraph does not exist. You would simply use p for paragraph. Therefore This is a heading is the correct answer.
Answer:
Yes, overloading is one of the methods which are popular in programming language. Overloading basically refers to the same function but different signature called function overloading or method overloading. It is the ability to define the multiples method by using the single identifier.
The overloading is important because it has the ability to design the multiple method by using similar name. It also provide the high flexibility to the programmers to call the same method in the data. overloading basically provide the high clarity in the code.
Overloading is used to achieved the compile time polymorphism.
Following are program of function overloading in c++ are:
Class abc // creating class
{
public:
int p;
void fun() // function fun with no parameter/
{
cout<<” hello “;
}
void fun(int a) // function fun with parameter
{
p=a;
cout<<p;
}
};
int main() // main function
{
abc ob; // creating object
ob.fun();// print hello;
ob.fun(6);// print 6
return 0;
}
Explanation:
In this program the function fun() have same name but different signature in the main method we create the object of class abc i.e ob. ob.fun() this statement called the function with no parameter and ob.fun(6) this statement will called the function with integer parameter.
Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Answer:
B
Explanation:
An authentication server server tracks who is logging on to the network as well as which services on the network are available to each user. It also does the job of providing a network service that applications can use to authenticate the credentials, that are oftentimes account names and passwords, of their users. Authentication server is also used as the basis for authorization.