Hardware . . . . . . . . . . . . . . . . . . ..
Answer:
1: false because it's just scams
2: true
Explanation:
Solution:
Database integrity ensures that each row is uniquely identified by the primary key, which means that a proper search for an existing tuple (row) will always be successful.
Thus the required answer is D
The final step in the object-oriented design (OOD) process consists of developing the <u>package diagrams.</u>
<u></u>
In the field of Computer studies, object-oriented design (OOD) can be described as a design method in which a proper system of interacting objects is planned for making a computing system or software.
The final step of an object-oriented design (OOD) involves the development of package diagrams. Package diagrams are structures or diagrams that are used for representing the model elements. The model elements are shown as packages in this kind of diagram.
Package diagrams are the final step of an object-oriented design process because they help to provide a visual idea of the overall proposed design.
To learn more about object-oriented designs, click here:
brainly.com/question/13383471
#SPJ4
<u>The possible consequences of intentional virus setting:</u>
Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other to different process such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop and tablet.
To avoid or protect the computer there are two type of antivirus.
- On desktop or tablet or laptop. (It is called resident firewall).
- Internet gateway. (It is called firewall)
So company create virus and to rectify they make money of that process.
To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.