Answer: Only A and C
Explanation: Default constructor is a constructor that has parameters with the values that are default or has no arguments/parameter present. Default constructor is not declared in the class rather it gets generated by itself when not defined.
Class is defined with data members, functions, objects etc are considered as per the requirement given by the user .It is the user defined concept.
Statement (B) is incorrect because static method is used for accessing the static members of the particular class and manipulate the value of it.
Thus, only statement (A) and (C) are correct.
Answer:
b. data type of arguments
Explanation:
One of the ways to overload a method is using different type of arguments. Let's say we have a method that finds and returns two integer values
public int sumValues(int num1, int num2){
return num1 + num2;
}
We can overload this method by passing double values as arguments
public double sumValues(double num1, double num2){
return num1 + num2;
}
Answer:
Sniffing.
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.
Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.
A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.
Basically, an unauthorized packet sniffer is used to steal user informations.
This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.
In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.
Answer:
The answer to this question is DVD and DVD-RW
Explanation:
The third one because u have to do parenthesis