Answer:
Reference type,generic type
Explanation:
Reference types are used by a reference that maintains a reference (address) to the object but not the object itself. Because reference kinds reflect the variable's address rather than the data itself, assigning a reference object to another does not copy the information. Instead, it produces a second duplicate of the reference, which relates to the same heap place as the initial value.
Examples of reference types are Classes, Arrays,, Interfaces etc.
A generic type is a generic class or interface that is parameterized over kinds. Essentially, generic types enable you to write a particular, generic class (or method) that operates with distinct kinds, enabling code to be reused.
The class Object describes the conduct of all Java objects. However, it does not describe the conduct of all Java data structures. That's because not all Java data structures are objects. Some of them are primitive values that can be stored in object variables, but they are not objects themselves.
Unlike object types, primitive types are not sub types or super types.
It might be because they are afraid that tge person they report will likley get into trouble or the report might not work and they will be abused more
This represents Guy <span>Kawasaki Rule for PowerPoint Presentations. Here is what it stands for:
</span><span>10 slides are the optimal number to use in a presentation.
20 minutes is the longest amount of time that you should speak.
<span>30 point font is the smallest font that you should use on slides.
</span></span>
Answer:
Answered below
Explanation:
Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.
Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.
Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.