Answer:
1.
class TIME
{
int hour , min , sec ;
public :
TIME()
{
hour=min=sec=0;
}
TIME( int h , int m , int s )
{
hour = h;
min = m;
sec = s;
}
void change ( int Hour)
{
hour = Hour;
}
void stdtime()
{
if(hour>12)
cout<<"The Standard time is"<<(hour-12)<<":"<<min<<":"<<sec<<"P.M\n";
else
cout<<"The Standard time is"<<hour<<":"<<min<<":"<<sec<<"A.M\n";
}
void miltime()
{
cout<<"The Military time is"<<hour<<":"<<min<<":"<<sec<<" hours\n";
}
};
void main()
{
TIME A , B(13,25,30);
A .stdtime();
A.change(23);
A.miltime();
B.stdtime();
B.change(9);
B.miltime();
}
2.
class elevator
{
int CurrentFloor;
int GoingUp;
int GoingDown;
public:
elevator()
{
CurrentFloor=0;
GoingUp=1;
GoingDown=-1;
}
elevator(int floor)
{
CurrentFloor=floor;
GoingUp=1;
GoingDown=-1;
}
void goUp(int y)
{
if( CurrentFloor>3)
cout<<"\nNO MORE FLOORS\n";
else
CurrentFloor=CurrentFloor+y*GoingUp;
}
void goDown(int x)
{
if(CurrentFloor<0)
cout<<"\nNO MORE FLOORS";
else
CurrentFloor=CurrentFloor+x*GoingDown;
}
};
void main()
{
elevator A(1);
A.goUp(1);
A.goUp(1);
A.goUp(1);
A.goDown(1);
A.goDown(1);
}
Answer:
<em>d. dumping.</em>
Explanation:
In international trade, dumping is described loosely as <em>selling products on a foreign market below their manufacturing expenses or selling products on a foreign market below their ' reasonable ' market value</em>.
It is a form of injury pricing, a difference in cost aimed at harming the competition.
Answer:
1. Option (a) is the correct answer. "Place a firewall between the Internet and your Web server".
2. Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".
3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".
4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".
5. Option (c) is the correct answer. "Enforce password complexity".
Explanation:
1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.
2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.
3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.
4.All personnel will be taught the network policies to avoid sending report to unsecured printers.
5. The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.
Answer:
The correct answer to the following question is option A. an avoidance spiral.
Explanation:
An avoidance spiral is a spiral in which parties avoid the conflicts at all cost in which leads to reducing the influence, dependence, etc. This spiral can also be destructive.
In other words, it is the only spiral in parties slowly reduces their dependence and the influence on the one and another.