Answer: a social protocol and something like DNS is that little socialbehavior, cues, or relationships are carried through DNS.
Explanation:
Answer:
Question is incomplete.
Assuming the below info to complete the question
You have a collection of n lockboxes and m gold keys. Each key unlocks at most one box. Without a matching key, the only way to open a box is to smash it with a hammer. Your baby brother has locked all your keys inside the boxes! Luckily, you know which keys (if any) are inside each box.
Detailed answer is written in explanation field.
Explanation:
We have to find the reachability using the directed graph G = (V, E)
In this V are boxes are considered to be non empty and it may contain key.
Edges E will have keys .
G will have directed edge b1b2 if in-case box b1 will have key to box b2 and box b1 contains one key in it.
Suppose if a key opens empty box or doesn’t contain useful key means can’t open anything , then it doesn’t belongs to any edge.
Now, If baby brother has chosen box B, then we have to estimate for other boxes reachability from B in Graph G.
If and only if all other boxes have directed path from box B then just by smashing box B we can get the key to box b1 till last box and we can unlock those.
After first search from B we can start marking all other vertex of graph G.
So algorithm will be O ( V +E ) = O (n+m) time.
Answer: Phishing
Explanation:
Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.
One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.
So Phishing is a for of identity theft.
Answer: talk about da progrm
Explanation:
Answer:
Import java.awt.*;
import java.util.*;
public class Sprhere
{// Instance Data private double surfaceA, volume, r, diameter; //Constructors public Sphere ()
{r = 0;diameter = 0; surfaceA = 0;volume = 0;}
public Sphere (double radius, double d, double SA, double v)
{this. r = radius; this. diameter = d; this. surfaceA = SA;this.volume = v;}
//--------------------------------------------------------------------// Accesors.//--------------------------------------------------------------------public double get Radius()
{return r;}
public double get Diameter()
{return diameter;}
public double get SurfaceA()
{return surfaceA;}
public double get Volume()
{return volume;}
//--------------------------------------------------------------------// Mutators.//--------------------------------------------------------------------