Answer:
D) It creates a vector object with a starting size of 10 and all elements are initialized with the value 2.
Explanation:
When you write the statement vector<int> v(10,2); This statement declares a vector or dynamic array of size 10 that is the first parameter and the second parameter is the value with which all the elements in the vector are to be initialized.So in this vector all the 10 values will be initialized with the value 2.It is one of the way of initializing the vector.
Would it be Tab. I know that if you are in Microsoft word it works like that.<span />
<span>Traffic Class header field is known as the priority field.</span>
Answer:
c. offers a great deal of network control and lower cost.
Explanation:
A network topology can be defined as a graphical representation of the various networking devices used to create and manage a network.
Compared with a star topology, a hierarchical topology offers a great deal of network control and lower cost.
Answer:
True
Explanation:
Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.
Rootkit tools:
1. Keyloggers
2. antivirus disablers
3. password stealers
4. banking credential stealers
5. bots for DDoS attacks