<u>Best method to sort data:</u>
Best method to sort for data people use excel sheet. If we have 4 quarter sales data of each select man wise.
1. Open the MS Excel
2. Create blank sheet
3. Create list of salesman and quarter sales in each cells from A1….
4. Select all whole worksheet and paste it the data
5. Once data is copied, custom list is created and select advanced options dialog box, select required field and sorting is achieved.
This is simple’s method for sort the list based on the names of the first four gas in ascending order.
The following cose will be used to copy assignment operator for CarCounter
<u>Explanation:</u>
Complete Program:
#include <iostream>
using namespace std;
class CarCounter
{
public:
CarCounter();
CarCounter& operator=(const CarCounter& objToCopy);
void SetCarCount(const int setVal)
{
carCount = setVal;
}
int GetCarCount() const
{
return carCount;
}
private:
int carCount;
};
CarCounter::CarCounter()
{
carCount = 0;
return;
}
// FIXME write copy assignment operator
/* Your solution goes here */
CarCounter& CarCounter::operator=(const CarCounter& objToCopy)
{
if(this != &objToCopy)
carCount = objToCopy.carCount;
return *this;
}
int main()
{
CarCounter frontParkingLot;
CarCounter backParkingLot;
frontParkingLot.SetCarCount(12);
backParkingLot = frontParkingLot;
cout << "Cars counted: " << backParkingLot.GetCarCount();
cout << endl << endl;
system("pause");
return 0;
}
Answer:
True
Explanation:
Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.
Rootkit tools:
1. Keyloggers
2. antivirus disablers
3. password stealers
4. banking credential stealers
5. bots for DDoS attacks
Answer and explanation :
the three control problems associated with competing process are
- MUTUAL EXCLUSION : We know that some resources are shareable and some are not shareable. which means only one process can access the resource at a time this type of resources are called critical resources this code can be access at only one process at a time. the other process if required to access should not be allowed
- DEADLOCK: this hold the process without complete for example suppose there are two resources R1 and R2 and two process P1 and P2 and P1 use R1 and P2 use R2 but after some time when P1 needs R2 but R2 is not available as it is used by P2 so the all process will be on hold
- STARVATION : when priorities are given to the process as high priorities and low priorities. And high priorities process always competing then low priorities process have to wait for very long time this is called starvation